o_19grqq7snim9mn019q11f7ds26a.pdf

Marcus Lemonis, a serial entrepreneur and host of the show “The Profit” on CNBC, is a true survivor in the corporate world. The native-born Lebanese business man endured the chaos of a civil war in Beirut and eventually moved to Miami. Lemonis was exposed to the automotive industry throughout his upbringing - his grandfather owning two of the largest Chevrolet dealerships in the United States and Lee Iacocca serving as the family friend and later mentor to Lemonis. On page 12, we conducted an interview with “Profit” host Marcus Lemonis, who offers struggling small businesses capital investment and his expertise in exchange for an ownership stake in the company. In the latter part of the magazine, we interviewed countless wealth advisors during these tough economic times. We recognize that some of the changes in 2013 and 2014 require relevance for financial planners. Therefore, the financial industry continues to push for more realistic standards and reforms. Marcus Lemonis, a serial entrepreneur and host of the show “The Profit” on CNBC, is a true survivor in the corporate world. The native-born Lebanese business man endured the chaos of a civil war in Beirut and eventually moved to Miami. Lemonis was exposed to the automotive industry throughout his upbringing - his grandfather owning two of the largest Chevrolet dealerships in the United States and Lee Iacocca serving as the family friend and later mentor to Lemonis. On page 12, we conducted an interview with “Profit” host Marcus Lemonis, who offers struggling small businesses capital investment and his expertise in exchange for an ownership stake in the company. In the latter part of the magazine, we interviewed countless wealth advisors during these tough economic times. We recognize that some of the changes in 2013 and 2014 require relevance for financial planners. Therefore, the financial industry continues to push for more realistic standards and reforms.

20.03.2015 Views

BAD BYOD HABITS THAT CAN EXPOSE YOUR COMPANY’S SENSITIVE DATA The BYOD (bring your own device) system is practiced by many business big and small these days, however, if good security measures aren’t implemented and adhered to your sensitive data can be vulnerable. Even with good employee compliance and security firewalls, sensitive data can still leak out. There are three areas to managing and maintaining a BYOD plan: Governance and Compliance In a survey conducted by Becker’s Hospital Review, of 421 organizations, 68 percent used a BYOD plan. However, less than 40 percent of that group implemented a mobile data management system. Furthermore, 45 percent of the organizations involved in BYOD plans reported incidents of lost mobile devices containing sensitive work information. Without proper security procedures and compliance rules, you leave your business exposed to leak sensitive data. Some common security risks occur when: • Staff members let non-staff people borrow their devices. Leapfrog reports that 46 percent of Americans allow non-company people to borrow their mobile devices. Make sure staff members understand that a piece of the company is on their devices and should be protected as such. • Staff store their work email passwords on their mobile devices—35 percent of Americans have admitted to doing this. A good idea is to have them write down their passwords in a notepad or in a folder that stays at their office desk and perhaps somewhere secure in their home. • Auto-lock features are not activated on staff BYOD devices. IT should hold a brief workshop with the staff to go over where these auto-lock features are on each mobile device, which would also be a great time for IT and administration to go over compliance polices and network sharing information. BYOD Policies and Mobile Device Management One bad situation that can occur when a business has a lax BYOD plan is that a fired employee could leave with sensitive data on their mobile device. All BYOD companies should have a policy where you are allowed to wipe all BYOD devices when an employee is terminated, and should include penalties for any violation. It’s also a good idea to list how many and the types of devices an employee can use so your IT department knows just how many types of devices its dealing with. Mobile Device Management (MDM) is ideal for dealing with security risks because it allows employers to remotely lock or wipe devices. This could be beneficial if a terminated employee fails to wipe the device or if anyone loses their phone. Be sure that you and your administrators know the rules and regulations about working on BYODs during non-work hours. Under some state laws, work on BYODs after work hours could constitute as overtime. Refrain from sending emails and texts and calling employees until the next business day. IT Security Perhaps the most important step in a BYOD plan is having your IT department set up a solid security plan to prevent infiltration of your business’ network. Some common vulnerable items include: • Public Wi-Fi Hotspots: Public access to hotspots are not secured, thus leaving hackers the ability to infiltrate a private system. If an employee allows his or her mobile device to be stolen, these hackers can wreak havoc for that staff member and your company’s entire software network. • Usernames and passwords: One bad habit staff members have is making a username and password that are the same for all their data storage platforms. If that one password is compromised, so too is the entire system. Change up the passwords by using your favorite sports players and their jersey numbers, pet names or your favorite books. Remember to keep this secure information written down at your office desk or in a folder at home, not in your mobile devices. • Man in the Middle hacks: Spoofing and phishing are two common ways hackers try to break into a system. Any email or solicitation that asks for money, personal financial information or social media account password information should be deemed highly suspicious and reported to your IT department. These scams can be under both familiar names and unfamiliar names, such as the Internal Revenue Service, so be extra careful in what emails you trust. If something looks and sounds fishy, then it probably is. • Malware: Simply put, if your business is using a BYOD plan, then the chances of your network getting attacked by viruses jumps significantly, considering how much downloading your staff members will be doing. If your IT isn’t installing anti-virus software—BYOD plan or not— then shame on you. This is sensitive information protection 101. The Bitdefender Antivirus Plus earned a perfect review in one survey of anti-malware software, getting recognition for its tools to safely do online banking and shopping. • Cloud Use: When a company uses a cloud system to store its data, it must find a way to keep staff from uploading sensitive information in apps and file-sharing sites like Dropbox. As secure as these sites and apps seem, IT must be sure to have a firewall on any backdoor access hackers could get into. THE SUIT MAGAZINE - JULY 2014

strength in AN INTEGRATED APPROACH TO FINANCIAL PLANNING balance “The Capital Legacy, LLC” is a team of dedicated professionals in the Financial, Retirement, Tax and Estate planning field. Our team provides integrated services by applying various disciplines such as managed investments, financial and retirement planning as well as benefit plans toward meeting our clients lifelong wealth accumulation and preservation objectives. We also coordinate with other specialists including accountants, attorneys and pension actuaries.* *Outside providers of professional services are neither affiliated with nor endorsed by Capital Legacy, LLC or LPL Financial. www.capitallegacypa.com WEALTH PLANNING * INSURANCE * EMPLOYEE BENEFITS 780 Newtown-Yardley Rd, Newtown Office Park Suite 310, Newtown, PA 18940

BAD BYOD HABITS THAT CAN EXPOSE<br />

YOUR COMPANY’S SENSITIVE DATA<br />

The BYOD (bring your own device)<br />

system is practiced by many business<br />

big and small these days, however,<br />

if good security measures aren’t implemented<br />

and adhered to your sensitive<br />

data can be vulnerable. Even with good<br />

employee compliance and security firewalls,<br />

sensitive data can still leak out.<br />

There are three areas to managing and<br />

maintaining a BYOD plan:<br />

Governance and Compliance<br />

In a survey conducted by Becker’s Hospital<br />

Review, of 421 organizations, 68<br />

percent used a BYOD plan. However, less<br />

than 40 percent of that group implemented<br />

a mobile data management system.<br />

Furthermore, 45 percent of the organizations<br />

involved in BYOD plans reported<br />

incidents of lost mobile devices containing<br />

sensitive work information. Without<br />

proper security procedures and compliance<br />

rules, you leave your business exposed<br />

to leak sensitive data.<br />

Some common security risks occur<br />

when:<br />

• Staff members let non-staff people<br />

borrow their devices. Leapfrog reports<br />

that 46 percent of Americans allow<br />

non-company people to borrow their<br />

mobile devices. Make sure staff members<br />

understand that a piece of the company is<br />

on their devices and should be protected<br />

as such.<br />

• Staff store their work email passwords<br />

on their mobile devices—35 percent<br />

of Americans have admitted to doing<br />

this. A good idea is to have them write<br />

down their passwords in a notepad or in<br />

a folder that stays at their office desk and<br />

perhaps somewhere secure in their home.<br />

• Auto-lock features are not activated<br />

on staff BYOD devices. IT should hold a<br />

brief workshop with the staff to go over<br />

where these auto-lock features are on<br />

each mobile device, which would also be<br />

a great time for IT and administration to<br />

go over compliance polices and network<br />

sharing information.<br />

BYOD Policies and Mobile Device<br />

Management<br />

One bad situation that can occur when<br />

a business has a lax BYOD plan is that a<br />

fired employee could leave with sensitive<br />

data on their mobile device. All BYOD<br />

companies should have a policy where<br />

you are allowed to wipe all BYOD devices<br />

when an employee is terminated,<br />

and should include penalties for any violation.<br />

It’s also a good idea to list how<br />

many and the types of devices an employee<br />

can use so your IT department<br />

knows just how many types of devices its<br />

dealing with.<br />

Mobile Device Management (MDM)<br />

is ideal for dealing with security risks<br />

because it allows employers to remotely<br />

lock or wipe devices. This could be beneficial<br />

if a terminated employee fails to<br />

wipe the device or if anyone loses their<br />

phone.<br />

Be sure that you and your administrators<br />

know the rules and regulations about<br />

working on BYODs during non-work<br />

hours. Under some state laws, work on<br />

BYODs after work hours could constitute<br />

as overtime. Refrain from sending emails<br />

and texts and calling employees until the<br />

next business day.<br />

IT Security<br />

Perhaps the most important step in a<br />

BYOD plan is having your IT department<br />

set up a solid security plan to prevent<br />

infiltration of your business’ network.<br />

Some common vulnerable items include:<br />

• Public Wi-Fi Hotspots: Public access<br />

to hotspots are not secured, thus leaving<br />

hackers the ability to infiltrate a private<br />

system. If an employee allows his or her<br />

mobile device to be stolen, these hackers<br />

can wreak havoc for that staff member<br />

and your company’s entire software network.<br />

• Usernames and passwords: One<br />

bad habit staff members have is making<br />

a username and password that are the<br />

same for all their data storage platforms.<br />

If that one password is compromised,<br />

so too is the entire system. Change up<br />

the passwords by using your favorite<br />

sports players and their jersey<br />

numbers, pet names<br />

or your favorite<br />

books. Remember<br />

to keep this secure information written<br />

down at your office desk or in a folder at<br />

home, not in your mobile devices.<br />

• Man in the Middle hacks: Spoofing<br />

and phishing are two common ways<br />

hackers try to break into a system. Any<br />

email or solicitation that asks for money,<br />

personal financial information or social<br />

media account password information<br />

should be deemed highly suspicious and<br />

reported to your IT department. These<br />

scams can be under both familiar names<br />

and unfamiliar names, such as the Internal<br />

Revenue Service, so be extra careful in<br />

what emails you trust. If something looks<br />

and sounds fishy, then it probably is.<br />

• Malware: Simply put, if your business<br />

is using a BYOD plan, then the chances of<br />

your network getting attacked by viruses<br />

jumps significantly, considering how<br />

much downloading your staff members<br />

will be doing. If your IT isn’t installing<br />

anti-virus software—BYOD plan or not—<br />

then shame on you. This is sensitive information<br />

protection 101. The Bitdefender<br />

Antivirus Plus earned a perfect review<br />

in one survey of anti-malware software,<br />

getting recognition for its tools to safely<br />

do online banking and shopping.<br />

• Cloud Use: When a company uses a<br />

cloud system to store its data, it must find<br />

a way to keep staff from uploading sensitive<br />

information in apps and file-sharing<br />

sites like Dropbox. As secure as these<br />

sites and apps seem, IT must be sure to<br />

have a firewall on any backdoor access<br />

hackers could get into.<br />

THE SUIT MAGAZINE - JULY 2014

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!