o_19grqq7snim9mn019q11f7ds26a.pdf
Marcus Lemonis, a serial entrepreneur and host of the show “The Profit” on CNBC, is a true survivor in the corporate world. The native-born Lebanese business man endured the chaos of a civil war in Beirut and eventually moved to Miami. Lemonis was exposed to the automotive industry throughout his upbringing - his grandfather owning two of the largest Chevrolet dealerships in the United States and Lee Iacocca serving as the family friend and later mentor to Lemonis. On page 12, we conducted an interview with “Profit” host Marcus Lemonis, who offers struggling small businesses capital investment and his expertise in exchange for an ownership stake in the company. In the latter part of the magazine, we interviewed countless wealth advisors during these tough economic times. We recognize that some of the changes in 2013 and 2014 require relevance for financial planners. Therefore, the financial industry continues to push for more realistic standards and reforms. Marcus Lemonis, a serial entrepreneur and host of the show “The Profit” on CNBC, is a true survivor in the corporate world. The native-born Lebanese business man endured the chaos of a civil war in Beirut and eventually moved to Miami. Lemonis was exposed to the automotive industry throughout his upbringing - his grandfather owning two of the largest Chevrolet dealerships in the United States and Lee Iacocca serving as the family friend and later mentor to Lemonis. On page 12, we conducted an interview with “Profit” host Marcus Lemonis, who offers struggling small businesses capital investment and his expertise in exchange for an ownership stake in the company. In the latter part of the magazine, we interviewed countless wealth advisors during these tough economic times. We recognize that some of the changes in 2013 and 2014 require relevance for financial planners. Therefore, the financial industry continues to push for more realistic standards and reforms.
BAD BYOD HABITS THAT CAN EXPOSE YOUR COMPANY’S SENSITIVE DATA The BYOD (bring your own device) system is practiced by many business big and small these days, however, if good security measures aren’t implemented and adhered to your sensitive data can be vulnerable. Even with good employee compliance and security firewalls, sensitive data can still leak out. There are three areas to managing and maintaining a BYOD plan: Governance and Compliance In a survey conducted by Becker’s Hospital Review, of 421 organizations, 68 percent used a BYOD plan. However, less than 40 percent of that group implemented a mobile data management system. Furthermore, 45 percent of the organizations involved in BYOD plans reported incidents of lost mobile devices containing sensitive work information. Without proper security procedures and compliance rules, you leave your business exposed to leak sensitive data. Some common security risks occur when: • Staff members let non-staff people borrow their devices. Leapfrog reports that 46 percent of Americans allow non-company people to borrow their mobile devices. Make sure staff members understand that a piece of the company is on their devices and should be protected as such. • Staff store their work email passwords on their mobile devices—35 percent of Americans have admitted to doing this. A good idea is to have them write down their passwords in a notepad or in a folder that stays at their office desk and perhaps somewhere secure in their home. • Auto-lock features are not activated on staff BYOD devices. IT should hold a brief workshop with the staff to go over where these auto-lock features are on each mobile device, which would also be a great time for IT and administration to go over compliance polices and network sharing information. BYOD Policies and Mobile Device Management One bad situation that can occur when a business has a lax BYOD plan is that a fired employee could leave with sensitive data on their mobile device. All BYOD companies should have a policy where you are allowed to wipe all BYOD devices when an employee is terminated, and should include penalties for any violation. It’s also a good idea to list how many and the types of devices an employee can use so your IT department knows just how many types of devices its dealing with. Mobile Device Management (MDM) is ideal for dealing with security risks because it allows employers to remotely lock or wipe devices. This could be beneficial if a terminated employee fails to wipe the device or if anyone loses their phone. Be sure that you and your administrators know the rules and regulations about working on BYODs during non-work hours. Under some state laws, work on BYODs after work hours could constitute as overtime. Refrain from sending emails and texts and calling employees until the next business day. IT Security Perhaps the most important step in a BYOD plan is having your IT department set up a solid security plan to prevent infiltration of your business’ network. Some common vulnerable items include: • Public Wi-Fi Hotspots: Public access to hotspots are not secured, thus leaving hackers the ability to infiltrate a private system. If an employee allows his or her mobile device to be stolen, these hackers can wreak havoc for that staff member and your company’s entire software network. • Usernames and passwords: One bad habit staff members have is making a username and password that are the same for all their data storage platforms. If that one password is compromised, so too is the entire system. Change up the passwords by using your favorite sports players and their jersey numbers, pet names or your favorite books. Remember to keep this secure information written down at your office desk or in a folder at home, not in your mobile devices. • Man in the Middle hacks: Spoofing and phishing are two common ways hackers try to break into a system. Any email or solicitation that asks for money, personal financial information or social media account password information should be deemed highly suspicious and reported to your IT department. These scams can be under both familiar names and unfamiliar names, such as the Internal Revenue Service, so be extra careful in what emails you trust. If something looks and sounds fishy, then it probably is. • Malware: Simply put, if your business is using a BYOD plan, then the chances of your network getting attacked by viruses jumps significantly, considering how much downloading your staff members will be doing. If your IT isn’t installing anti-virus software—BYOD plan or not— then shame on you. This is sensitive information protection 101. The Bitdefender Antivirus Plus earned a perfect review in one survey of anti-malware software, getting recognition for its tools to safely do online banking and shopping. • Cloud Use: When a company uses a cloud system to store its data, it must find a way to keep staff from uploading sensitive information in apps and file-sharing sites like Dropbox. As secure as these sites and apps seem, IT must be sure to have a firewall on any backdoor access hackers could get into. THE SUIT MAGAZINE - JULY 2014
strength in AN INTEGRATED APPROACH TO FINANCIAL PLANNING balance “The Capital Legacy, LLC” is a team of dedicated professionals in the Financial, Retirement, Tax and Estate planning field. Our team provides integrated services by applying various disciplines such as managed investments, financial and retirement planning as well as benefit plans toward meeting our clients lifelong wealth accumulation and preservation objectives. We also coordinate with other specialists including accountants, attorneys and pension actuaries.* *Outside providers of professional services are neither affiliated with nor endorsed by Capital Legacy, LLC or LPL Financial. www.capitallegacypa.com WEALTH PLANNING * INSURANCE * EMPLOYEE BENEFITS 780 Newtown-Yardley Rd, Newtown Office Park Suite 310, Newtown, PA 18940
- Page 1 and 2: Issue 61 JULY 2014 exclusive interv
- Page 3 and 4: publishers note ISSUE 61 | JULY 201
- Page 5 and 6: BUSINESS / FINANCE 31 Equity Exposu
- Page 7 and 8: THE SUIT MAGAZINE p.7
- Page 9 and 10: nia cities reveals still lower mini
- Page 11: STILL PUZZLED ... by your supply ch
- Page 14 and 15: to finance struggling businesses on
- Page 16 and 17: y diane e. alter TRIVIA ISN’T TRI
- Page 18 and 19: The 7 Most Common Negotiating Mista
- Page 22 and 23: y david stein >>> Lease - Don’t O
- Page 24 and 25: y felix badea Talking Face to Face
- Page 26 and 27: Meeting With The Wife Too Both spou
- Page 28 and 29: STILL PUZZLED ... by your supply ch
- Page 30 and 31: y judy magness Building Wealth in S
- Page 32 and 33: y judy magness The Complications of
- Page 34 and 35: y david stein DANGER On The Way Dow
- Page 36 and 37: Brave Investing During a Sell-Off P
- Page 38: y judy magness Off Campus Housing P
- Page 41 and 42: part of why he attained a certifica
- Page 43 and 44: With the utmost of integrity, we ta
- Page 46 and 47: MOTIVATED CLIENTS ALWAYS WELCOME En
- Page 48 and 49: y amy m. armstrong A DISCIPLINED AP
- Page 50 and 51: y judy magness Guiding Investor Ris
- Page 52 and 53: y amy m. armstrong LEARNING FROM MI
- Page 54 and 55: Promoting World-Changing Innovation
- Page 56 and 57: y amy m. armstrong CANDID CONVERSAT
- Page 58 and 59: y david stein Proving Himself to Cl
- Page 60 and 61: y judy magness Alternative to Tradi
- Page 62 and 63: y diane e. alter Revealing Risk Tol
- Page 64 and 65: y a. marie velthuizen One Uniform S
- Page 66 and 67: WHY RENEWABLE ENERGY? Save money. R
- Page 68 and 69: y judy magness FROM RETIREMENT DREA
BAD BYOD HABITS THAT CAN EXPOSE<br />
YOUR COMPANY’S SENSITIVE DATA<br />
The BYOD (bring your own device)<br />
system is practiced by many business<br />
big and small these days, however,<br />
if good security measures aren’t implemented<br />
and adhered to your sensitive<br />
data can be vulnerable. Even with good<br />
employee compliance and security firewalls,<br />
sensitive data can still leak out.<br />
There are three areas to managing and<br />
maintaining a BYOD plan:<br />
Governance and Compliance<br />
In a survey conducted by Becker’s Hospital<br />
Review, of 421 organizations, 68<br />
percent used a BYOD plan. However, less<br />
than 40 percent of that group implemented<br />
a mobile data management system.<br />
Furthermore, 45 percent of the organizations<br />
involved in BYOD plans reported<br />
incidents of lost mobile devices containing<br />
sensitive work information. Without<br />
proper security procedures and compliance<br />
rules, you leave your business exposed<br />
to leak sensitive data.<br />
Some common security risks occur<br />
when:<br />
• Staff members let non-staff people<br />
borrow their devices. Leapfrog reports<br />
that 46 percent of Americans allow<br />
non-company people to borrow their<br />
mobile devices. Make sure staff members<br />
understand that a piece of the company is<br />
on their devices and should be protected<br />
as such.<br />
• Staff store their work email passwords<br />
on their mobile devices—35 percent<br />
of Americans have admitted to doing<br />
this. A good idea is to have them write<br />
down their passwords in a notepad or in<br />
a folder that stays at their office desk and<br />
perhaps somewhere secure in their home.<br />
• Auto-lock features are not activated<br />
on staff BYOD devices. IT should hold a<br />
brief workshop with the staff to go over<br />
where these auto-lock features are on<br />
each mobile device, which would also be<br />
a great time for IT and administration to<br />
go over compliance polices and network<br />
sharing information.<br />
BYOD Policies and Mobile Device<br />
Management<br />
One bad situation that can occur when<br />
a business has a lax BYOD plan is that a<br />
fired employee could leave with sensitive<br />
data on their mobile device. All BYOD<br />
companies should have a policy where<br />
you are allowed to wipe all BYOD devices<br />
when an employee is terminated,<br />
and should include penalties for any violation.<br />
It’s also a good idea to list how<br />
many and the types of devices an employee<br />
can use so your IT department<br />
knows just how many types of devices its<br />
dealing with.<br />
Mobile Device Management (MDM)<br />
is ideal for dealing with security risks<br />
because it allows employers to remotely<br />
lock or wipe devices. This could be beneficial<br />
if a terminated employee fails to<br />
wipe the device or if anyone loses their<br />
phone.<br />
Be sure that you and your administrators<br />
know the rules and regulations about<br />
working on BYODs during non-work<br />
hours. Under some state laws, work on<br />
BYODs after work hours could constitute<br />
as overtime. Refrain from sending emails<br />
and texts and calling employees until the<br />
next business day.<br />
IT Security<br />
Perhaps the most important step in a<br />
BYOD plan is having your IT department<br />
set up a solid security plan to prevent<br />
infiltration of your business’ network.<br />
Some common vulnerable items include:<br />
• Public Wi-Fi Hotspots: Public access<br />
to hotspots are not secured, thus leaving<br />
hackers the ability to infiltrate a private<br />
system. If an employee allows his or her<br />
mobile device to be stolen, these hackers<br />
can wreak havoc for that staff member<br />
and your company’s entire software network.<br />
• Usernames and passwords: One<br />
bad habit staff members have is making<br />
a username and password that are the<br />
same for all their data storage platforms.<br />
If that one password is compromised,<br />
so too is the entire system. Change up<br />
the passwords by using your favorite<br />
sports players and their jersey<br />
numbers, pet names<br />
or your favorite<br />
books. Remember<br />
to keep this secure information written<br />
down at your office desk or in a folder at<br />
home, not in your mobile devices.<br />
• Man in the Middle hacks: Spoofing<br />
and phishing are two common ways<br />
hackers try to break into a system. Any<br />
email or solicitation that asks for money,<br />
personal financial information or social<br />
media account password information<br />
should be deemed highly suspicious and<br />
reported to your IT department. These<br />
scams can be under both familiar names<br />
and unfamiliar names, such as the Internal<br />
Revenue Service, so be extra careful in<br />
what emails you trust. If something looks<br />
and sounds fishy, then it probably is.<br />
• Malware: Simply put, if your business<br />
is using a BYOD plan, then the chances of<br />
your network getting attacked by viruses<br />
jumps significantly, considering how<br />
much downloading your staff members<br />
will be doing. If your IT isn’t installing<br />
anti-virus software—BYOD plan or not—<br />
then shame on you. This is sensitive information<br />
protection 101. The Bitdefender<br />
Antivirus Plus earned a perfect review<br />
in one survey of anti-malware software,<br />
getting recognition for its tools to safely<br />
do online banking and shopping.<br />
• Cloud Use: When a company uses a<br />
cloud system to store its data, it must find<br />
a way to keep staff from uploading sensitive<br />
information in apps and file-sharing<br />
sites like Dropbox. As secure as these<br />
sites and apps seem, IT must be sure to<br />
have a firewall on any backdoor access<br />
hackers could get into.<br />
THE SUIT MAGAZINE - JULY 2014