{"id":49119,"date":"2022-03-10T08:45:30","date_gmt":"2022-03-10T16:45:30","guid":{"rendered":"http:\/\/www.enxmag.com\/twii\/?p=49119"},"modified":"2022-03-10T08:49:58","modified_gmt":"2022-03-10T16:49:58","slug":"pearson-kelly-technology-cybersecurity-event-provides-perspective-amid-military-conflict","status":"publish","type":"post","link":"https:\/\/www.enxmag.com\/twii\/feature-articles\/2022\/03\/pearson-kelly-technology-cybersecurity-event-provides-perspective-amid-military-conflict\/","title":{"rendered":"Pearson-Kelly Technology Cybersecurity Event Provides Perspective Amid Military Conflict"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignleft size-medium\"><img loading=\"lazy\" width=\"300\" height=\"168\" src=\"https:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2022\/03\/PKT-300x168.jpg\" alt=\"\" class=\"wp-image-49120\" srcset=\"https:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2022\/03\/PKT-300x168.jpg 300w, https:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2022\/03\/PKT.jpg 760w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n\n<p>It comes as little surprise that cybersecurity has taken center stage for the business community as U.S. intelligence cautions that Russian-borne cyberattacks could increase in light of the country\u2019s military conflict with Ukraine, which has entered its third week. The Cybersecurity &amp; Infrastructure Security Agency issued a statement encouraging organizations to \u201ctake steps now to improve their cybersecurity and safeguard their critical assets.\u201d<\/p>\n\n\n\n<p>It was against this backdrop that Pearson-Kelly Technology of Springfield, Missouri\u2014in conjunction with the Springfield Tech Council\u2014hosted 75 small business executives and IT professionals from the city and surrounding communities for a cybersecurity presentation and Q&amp;A.<\/p>\n\n\n\n<p>The cybersecurity panel featured a pair of experts: Jay Ryerse, vice president of cybersecurity initiatives for ConnectWise and a 25-year veteran of the IT, security and cybersecurity sectors; and Tyler Stilley, CISSP, Pearson-Kelly Technology\u2019s virtual chief information security officer (vCISO), who has spent the past 12 years in the technology industry, primarily in health care, where he helped craft cybersecurity solutions from scratch.<\/p>\n\n\n\n<p>You can watch the video presentation below.<\/p>\n\n\n\n<p><\/p><iframe src=\"https:\/\/www.youtube.com\/embed\/znH8WBJYBic\" title=\"YouTube video player\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\" width=\"560\" height=\"315\" frameborder=\"0\"><\/iframe>\n\n\n\n<p>The panel also offered attendees a number of strategies and tactics that businesses can execute on in short order to augment their cybersecurity practices. A full assessment of a business\u2019 current environment, as is always the case, will provide a better understanding of where an end-user stands to begin to craft a tailored solution and prioritize needs. Some simple steps businesses can take include:<\/p>\n\n\n\n<ul><li>Verify software patches and updates are installed on all devices<\/li><li>Enable multi-factor authentication (2FA)<\/li><li>Change passwords for network devices and require 2FA<\/li><li>Remove internet-facing management consoles<\/li><li>Upgrade end of service software or hardware<\/li><li>Document and train on the process for reporting suspicious activity<\/li><li>Implement SIEM<\/li><li>Test backups and take at least on version offline every month<\/li><li>Review policies and procedures, especially incident response plans<\/li><li>Perform a cybersecurity assessment<\/li><\/ul>\n\n\n\n<p><strong>Hacker Flare-ups<\/strong><\/p>\n\n\n\n<p>Following Russia\u2019s invasion of Ukraine, there were reports that groups partisan to each country may be bracing for a \u201cCyber World War\u201d that may be triggered as sanctions against Russia by the United States and NATO continue to intensify. While there have been no documented attacks to date, the fear is that such groups may target critical infrastructures such as transportation, financial services, oil pipelines and power grids.<\/p>\n\n\n\n<p>On March 1, the U.S. Senate passed the Strengthening American Cybersecurity Act. If it clears the House of Representatives, it would require companies to notify the government\u2014namely Homeland Security\u2019s Cybersecurity and Infrastructure Security Agency (CISA) of potential attacks within 72 hours. The bill is facing opposition from other agencies, namely the FBI, for its lack of inclusion in the notification process.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It comes as little surprise that cybersecurity has taken center stage for the business community as U.S. intelligence cautions that Russian-borne cyberattacks could increase in light of the country\u2019s military conflict with Ukraine, which has entered its third week. The Cybersecurity &amp; Infrastructure Security Agency issued a statement encouraging organizations to \u201ctake steps now to improve their cybersecurity and safeguard their critical assets.\u201d It was against this backdrop that Pearson-Kelly Technology of Springfield, Missouri\u2014in conjunction with the Springfield Tech Council\u2014hosted 75 small business executives and IT professionals from the city and surrounding communities for a cybersecurity presentation and Q&amp;A. The cybersecurity panel featured a pair of experts: Jay Ryerse, vice president of cybersecurity initiatives for ConnectWise and a 25-year veteran of the IT, security and cybersecurity sectors; and Tyler Stilley, CISSP, Pearson-Kelly Technology\u2019s virtual chief information security officer (vCISO), who has spent the past 12 years in the technology industry, primarily in health care, where he helped craft cybersecurity solutions from scratch. You can watch the video presentation below. The panel also offered attendees a number of strategies and tactics that businesses can execute on in short order to augment their cybersecurity practices. A full assessment of a business\u2019 current environment, as is always the case, will provide a better understanding of where an end-user stands to begin to craft a tailored solution and prioritize needs. Some simple steps businesses can take include: Verify software patches and updates are installed on all devices Enable multi-factor authentication (2FA) Change passwords for network devices and require 2FA Remove internet-facing management consoles Upgrade end of service software or hardware Document and train on the process for reporting suspicious activity Implement SIEM Test backups and take at least on version offline every month Review policies and procedures, especially incident response plans Perform a cybersecurity assessment Hacker Flare-ups Following Russia\u2019s invasion of Ukraine, there were reports that groups partisan to each country may be bracing for a \u201cCyber World War\u201d that may be triggered as sanctions against Russia by the United States and NATO continue to intensify. While there have been no documented attacks to date, the fear is that such groups may target critical infrastructures such as transportation, financial services, oil pipelines and power grids. On March 1, the U.S. Senate passed the Strengthening American Cybersecurity Act. If it clears the House of Representatives, it would require companies to notify the government\u2014namely Homeland Security\u2019s Cybersecurity and Infrastructure Security Agency (CISA) of potential attacks within 72 hours. The bill is facing opposition from other agencies, namely the FBI, for its lack of inclusion in the notification process.<\/p>\n","protected":false},"author":166,"featured_media":49120,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1650,82,87,1638],"tags":[3654],"_links":{"self":[{"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts\/49119"}],"collection":[{"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/comments?post=49119"}],"version-history":[{"count":3,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts\/49119\/revisions"}],"predecessor-version":[{"id":49128,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts\/49119\/revisions\/49128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/media\/49120"}],"wp:attachment":[{"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/media?parent=49119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/categories?post=49119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/tags?post=49119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}