Subscribe | E-Editions | River News 75Ę | Super Shopper - FREE | About Us | Contact Us | FREE Classified Ė Items Under $50
The Northwoods River News | Rhinelander, Wisconsin

Flanders Realty Group

home : news : county/state news
September 23, 2019

Jamie Taylor/river news

Jackie Edwards, director of marketing for RMM Solutions, gestures toward the Threat Map projected on the screen which shows cyber attacks from all over the world. Representatives from RMM Solutions briefed local business leaders on the threats Aug. 24 at Nicolet.
Jamie Taylor/river news

Jackie Edwards, director of marketing for RMM Solutions, gestures toward the Threat Map projected on the screen which shows cyber attacks from all over the world. Representatives from RMM Solutions briefed local business leaders on the threats Aug. 24 at Nicolet.
8/31/2019 7:30:00 AM
Local business leaders learn about cyber threats to companies of all sizes

Jamie Taylor
River News Reporter


Technology is supposed to help business owners and employees be more efficient and productive, thus boosting profits. However, as a group of Northwoods business owners learned during a recent seminar at Nicolet College's Fieldside Center, the rub is this same technology is increasingly being used by hackers to attack and steal from them.

Rimon Moses and Jackie Edwards of RMM Solutions, who led the presentation entitled Cyber Security Tactics for Northwoods Businesses, told the assembled business leaders that hackers are spending ten times what their targets in the U.S. spend annually on cyber security.

Edwards started the presentation, which was sponsored by Grow North, by showing the group a computer display that their company generates that tracks cyber threats worldwide, including their origin point and their targets.

"This is what's called a threat map," Edwards said. "And basically, what this is doing is showing us all the different threats that are coming into the United States right now. And the really scary part about this is it's about a third of what is really happening out there."

According to Edwards, over the course of the day, the pace of cyber attacks tends to increase. But even at its lowest point, the map shows that the "we are always under attack."

"Our personal belief is a layered security approach to things because I don't think that there is one solution or one thing you can do, or two," Moses said. "You need to continue to layer as the threats continue to change."

Moses said the number one question his company gets from customers is how does the company invest in technology and pay for it.

"That's a big deal because technology is expensive so we have ways to help people do that," he said.

Using his rented cellphone as an example, Moses noted that technology is increasingly moving in the direction of renting services such as what his company offers. The most important technology expense for a business is its cyber security, he added.

"How many of you are comfortable with the security that you have? That's a serious question," Moses said. "Does anybody really feel comfortable with the security of your organization or your personal security and that stuff?"

According to Moses, there are five myths about cyber threats that companies need to know about. They are:

• Hackers only go after large companies.

• Small business don't offer anything of value to hackers.

• Most hackers aren't dangerous; they're just teenagers.

• Law enforcement will protect me from a cyber attack.

• Hackers are not well funded.

Moses said believing any of these myths can leave a company open to threats such as ransomware, malware or the theft of data.

In dispelling the first myth, Moses said 43 percent of cyber attacks target small businesses.

"That's a lot, 43 percent. So if you think about the large number of enterprise businesses that are out there, they employ a lot of people," he said. "Like G.E. (General Electric) employs hundreds of thousands of people. They (hackers) do go after those guys, and they go after them hard. But only 57 percent of the time are they going after those companies."

Companies in the Northwoods are easy targets for hackers, he added.

Moses said the second myth persists because small businesses don't know how much valuable information is stored electronically.

"Small businesses and people like us have a lot of information," Moses said. "We have personal data, social security information, we sometimes have credit card information. Everyone in all organizations is involved and has a lot of connection outside of our business or organization; if they can tap into us, they can tap into that."

Moses also said that hackers can use personal information to take out loans, steal identities, make wire transfers and complete other scams. He also warned that companies have a lot of intellectual property that hackers can steal and then resell on the dark web.

According to Moses, hackers usually gain access to a company's computer network via social media. Particularly problematic are cases where employees use the same password for the work computer and their personal social media accounts.

"If they can access those credentials they can access you, they can get into this stuff, and they have a way of getting to a lot of other stuff," he said.

Through social media hackers can get login information, along with the names of other potential targets, he added.

"Through Facebook, (they) can find out who is connected to your account," Moses said.

As for the third myth, hackers should be considered very dangerous to a business, he insisted.

"This is a job, a very lucrative job for people, and I think the last count was there are hundreds of thousands of people that do this type of work every single day," Moses said. "And they're not just in Croatia and they're not in Russia, they're in the U.S. So they're all over and they spend their whole time, as opposed to our guys fixing things, they try to build code and write code that compromises and accesses all of our data. That's what they do for a living, and they're not very nice people. It's a big money business; they spend a lot of money and they make a lot of money."

The fourth myth is easy to dispel, due the sheer number of attacks hackers launch every day, Moses added.

"Unfortunately, law enforcement is not in the business of protecting us from cyber attacks," Moses said. "After the fact, after you've been compromised, they'll come in and try to help you. Sometimes they'll call in the F.B.I. and do some things, but they're just not in on the front end of it."

He said the government has a lot of resources, and a few months ago Rep. Sean Duffy brought some experts in to talk to some of the government's cyber professionals.

"I asked them what they are going to do about cyber security, because it is a big deal," Moses said. "They have a lot of resources, they can't talk about a lot of them, but they are also at a loss at how to contain it because you can't stop the Internet."

For example, it would be impossible to, say, stop all email from Russia or China from entering the United States.

Moses said the government is having a hard time figuring out a strategy for combating the hackers, "so they're putting it all on us (security firms)."

"We have to figure out a way to do it," he said. "Law enforcement, as much as they want to help, they don't have the resources to be proactive here," he added.

Finally, statistics dispel the last myth that hackers are not well funded, Moses explained.

"I can tell you for a fact that hackers spend ten times more than businesses in the U.S. spend," Moses said. "The last count I saw was that in the U.S. we spend about $100 million with protecting ourselves in cyber security protection, hackers globally spend about a trillion dollars creating pathogens and hacking people."

Ultimately, Moses said that the best way to combat the threat posed by hackers is by layering their security, setting up their emails to flag those from external sites, and aggressively teaching and test their employees on how to avoid falling for phishing attempts of other email forms of attack.

He also said that cyber security should be a priority from the CEO down to the lowest level worker who has access to a company's computer network.

The four major forms of cyber attacks are phishing, ransomware, spyware and web-borne malware, he added.

He also urged the business leaders to back up their network to an off-site location on a frequent basis.

"This is a really big deal," Moses said. "And if you're not doing this on a regular basis, you're putting yourself at risk and compromising yourself. Hackers are not looking for the hardest way to get in, they're looking for the easiest way to get in."

Jamie Taylor may be reached via email at jamie@rivernews online.com.





Article Comment Submission Form
Please feel free to submit your comments.

Article comments are not posted immediately to the Web site. Each submission must be approved by the Web site editor, and meet the comment guidelines (see "Comment Guidelines" at right). There may be a delay of 24-48 hours for any submission while the web site editor reviews and approves it.

Note: All information on this form is required. Your telephone number and email address is for our use only, and will not be attached to your comment.
Submit an Article Comment
First Name:
Required
Last Name:
Required
Telephone:
Required
Email:
Required
Comment:
Required
Passcode:
Required
Anti-SPAM Passcode Click here to see a new mix of characters.
This is an anti-SPAM device. It is not case sensitive.
   


Advanced Search
search sponsored by



Subscription Login
LOGIN | SUBSCRIBE


Today's Circulars
Print-N-Save Coupons
Order photo reprints

Classifieds
Advertising Information

Community Connections
Submit to Newspaper...

Ced Vig's books for sale
Kris Gilbertson's 'I Recall...'

Twitter
Relay for Life

Reader Poll

Do you agree with the School District of Rhinelanderís decision to dismiss football coach Chris Ferge?

Please select one:
Yes
No
I have no opinion.

View Results
Reader Poll

Which of the following best describes your reaction to the Republicans move to curtail the power of Governor-elect Tony Evers and Attorney General-elect Josh Kaul?

Please select one:
I have no issue with it. Itís a normal part of todayís politics.
Itís unconscionable, but Iím confidant the courts will overturn the bills.
Iím OK with it as long as both parties are allowed to do it.
I have no opinion on this question.

View Results
Reader Poll

Which City of Rhinelander elected officials should be recalled?

Please select one:
All of them. The mayor and the entire Common Council.
I would recall the council but keep the mayor.
I would recall the mayor but keep the council.
Everyone but alderman Emmer, as he was just appointed.
Frederickson, Sauer, Holt, Rossing and Larson.
Rog, Kirby and Kelly.

View Results
Reader Poll

Which of the following local taxing authorities has been the most fiscally responsible over the last 12 months?

Please select one:
School District of Rhinelander
City of Rhinelander
Oneida County
None of them have been as fiscally responsible as they should be.
They've all been fiscally responsible.
I have no opinion on this question.

View Results









Life
Facebook | All Things | Wisconsin Lottery | The Lakeland Times - affiliate | Winter Road Conditions | Snow/Trail Conditions


The Northwoods River News | Walker Communications, LLC
232 S. Courtney Street, Rhinelander, WI 54501 | Office (715) 365-6397 | Fax (715) 365-6361

Corporate billing office: The Lakeland Times / Lakeland Printing Inc. | P.O. Box 790, Minocqua, WI 54548 | (715) 356-5236 | Fax (715) 358-2121
Members of the Wisconsin Newspaper Association, Wisconsin Community Papers, Rhinelander Area Chamber of Commerce, Minocqua Area Chamber of Commerce

Site Design and Content | Copyright 2019 1up!

Software © 1998-2019 1up! Software, All Rights Reserved