19.01.2021 Views

WINTER 2021

Distributor's Link Magazine Fall 2020 / Vol 44 No 1

Distributor's Link Magazine Fall 2020 / Vol 44 No 1

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

48<br />

THE DISTRIBUTOR’S LINK<br />

Joe Dysart<br />

Joe Dysart is an Internet speaker and business consultant based in Thousand Oaks,<br />

California. A journalist for 20 years, his articles have appeared in more than 40<br />

publications, including The New York Times and The Financial Times of London.<br />

During the past decade, his work has focused exclusively on ecommerce.<br />

Telephone: 631-256-6602; web: www.joedysart.com; email: joe@dysartnewsfeatures.com<br />

SECURING YOUR COMPUTER NETWORK: KEY MOVES<br />

FASTENER DISTRIBUTORS SHOULD MAKE FOR <strong>2021</strong><br />

Always a pressing challenge, the security of your<br />

fastener distributorship’s computer network is facing<br />

an even greater threat in <strong>2021</strong> given the stubborn<br />

persistence of the Coronavirus, according to security<br />

pros.<br />

Ever creative, hackers are riffing on Coronavirus fears<br />

by sending employees officiallooking<br />

emails pretending to<br />

feature new business policies<br />

on the Coronavirus.<br />

Also showing up in<br />

inboxes are new Coronavirus<br />

announcements<br />

from<br />

government agencies and<br />

the latest updates on free<br />

government financial support<br />

during the epidemic.<br />

Unfortunately, all those<br />

hacker emails turn-out to be<br />

malicious. And they often<br />

result in the penetration of<br />

your computer network by<br />

hackers, the installation of<br />

malware on your computers –<br />

and worse.<br />

Meanwhile, fastener distributors are also facing<br />

increasing break-ins on cloud accounts in <strong>2021</strong>, more<br />

personalized ransomware attacks that use employee or<br />

manager credentials to penetrate your network.<br />

In addition, there’s also the age-old problem of<br />

employee insistence on using passwords that are<br />

ridiculously easy to guess.<br />

The upshot: Fastener distributors need to get current<br />

on The expected to surge in new computer network<br />

security threats in <strong>2021</strong> – and then make the necessary<br />

moves to ensure they’re protected.<br />

HACKERS ARE RIFFING ON CORONAVIRUS FEARS<br />

WITH NEW TRICKS<br />

HACKERS ARE SENDING MALICIOUS EMAILS PRETENDING<br />

TO BE COMMUNICATIONS ABOUT NEW CORONAVIRUS<br />

BUSINESS POLICIES.<br />

Says Kasey Panetta, senior content marketing manager,<br />

Gartner, a consulting firm<br />

specializing in tech (www.<br />

gartner.com) “Focus on<br />

business requirements. And<br />

understand how users and<br />

groups access data and<br />

applications.<br />

“Now that a few months<br />

have passed since the<br />

initial remote push (due to<br />

the Coronavirus), it’s time<br />

for a needs assessment and<br />

review of what has changed<br />

to determine if access levels<br />

are correct and whether<br />

any security measures are<br />

actually impeding work.”<br />

Towards that end, here<br />

are the key moves fastener<br />

distributors need to make to ensure their computer<br />

networks are protected from the coming storm:<br />

¤ Secure Your Remote Workforce: With so many<br />

more employees working from home these days, an IT<br />

department needs to take special care to safeguard<br />

network connections between work and home.<br />

CONTRIBUTOR ARTICLE<br />

CONTINUED ON PAGE 126

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!