Does Cyber Security News Matter to Los Angeles Distributors?

Author: Craig Pollack Date: Feb 23, 2015 Topics: _Distribution and Manufacturing Blogs

Does-Cyber-Security-News-Matter-to-Los-Angeles-DistributorsWith only so many hours in each day to manage vendors, resellers, staff, products, services and revenues, a Los Angeles distributor’s time is precious. So why take the time to check up on cyber security news?

With more business done today through IT systems, enterprise vulnerability to cyber menaces is increasing. Those risks evolve constantly and staying up to date is a priority. A smaller distributor that hopes to escape attack simply because it has a lower profile may be fooling itself.

Small to mid-size companies can be more highly targeted for hacker attacks since they are deemed to be not as fully protected. Acting on news about cyber security can make a significant difference.

Maintaining Trust

It’s not only your own company systems that are at stake. Your business partners and resellers trust you to provide reliable distribution services, preferably without problems. Good cyber security news:

  • Pinpoints viruses, worms, and other malware that might negatively affect your performance
  • Helps to resolve security issues before they cross over to infect your contacts
  • Warns of any new risks to be countered and solutions for enhanced IT security
  • Contributes to maintaining awareness among your staff about threats and also about best practices for information security in general  

Network Traffic Analysis

You can also get news that is specifically relevant to you by analyzing your own IT network traffic. It is possible to track down all the calls, communications, and data transfers made, including any unauthorized transfers (exfiltration).

Keeping recent network traffic data helps pinpoint the origins of attacks so that you can tackle the cause and not just the symptoms. You can do this using in-house resources or using the resources of a trusted IT services provider that also has the necessary security expertise. 

Do You Have Intruders in Your Systems Right Now?

Your systems may seem to be working perfectly well, and yet they may already be under the control of external hackers. In recent times there has been an increase in ‘advanced persistent threats’ (APTs), in which hackers discretely establish strongholds in enterprise systems and wait for months or more before taking action.

Network traffic analysis can give you ‘news’ of such hacker activity, including:

  • Data files being stockpiled in one system ready for illicit transfer
  • Communications and file transfers happening at strange times of the day or night (foreign hacking)
  • Use of your distributorship systems as a base for attacking other companies

No News is No Longer Good News

With this kind of threat and the changing face of hacker attacks, it is no longer possible to simply ‘manage by exception’. You may never see the exception until it is too late. From frequent anti-virus software updates for PCs to regular server scanning and checking, cyber security is like eating health: it’s a regular, daily activity rather than an occasional attempt to do right.

 

Which cyber security news has helped you deal with threats recently? Share your war stories with us in the Comments box below.

 

And to follow-through on the tips introduced in this short article, be sure to download your free guide, How COOs at Los Angeles Distributors and Manufacturers Get More Done: A Guide to Productivity, Data, Staffing, Delegation, and Making It Home for Dinner Most Nights.

 

New Call-to-action

Author

Craig Pollack

Craig Pollack

Craig is the Founder & CEO of FPA Technology Services, Inc. Craig provides the strategy and direction for FPA, ensuring its clients, business owners, and key decision makers leverage technology as efficiently and effectively as possible. With over 30 years of experience building the preeminent IT Service Provider in the Southern California area, Craig is one of the area’s leading authorities on how small to mid-sized businesses can best leverage and secure their technology to achieve their business objectives.

Comments