DP Solutions Newsletter

August 2017 Newsletter

 

Printer Friendly PDF


Cyber-Security Webinar

 

Ever wonder how businesses get exposed to cyber-attacks like ransomware, phishing, social engineering scams, and more? More importantly, is YOUR organization vulnerable to these threats? 

 

Tune in to our webinar,Managing Cyber Security Risks where you’ll discover: 

  • The most common ways attackers breach an organization
  • Where attacks frequently originate from
  • How to identify your risk factors
  • And more

Thursday, August 24 at 11:00 AM

Register >>

 


 

The ONE Thing You Must Do to Keep Your Data Safe in the Cloud

 

bigstock--164582459 (175x116).jpg

How secure is your data? Cloud data storage is becoming a massive industry in this country, and many businesses and other institutions are putting their data into the cloud. Some of this data is pretty harmless. Other stuff — like hospital records, banking information, or company payrolls — are prime targets for bad actors. Is the cloud storage tradeoff worth it?

 

The short answer is yes, but only if your IT guy is encrypting your sensitive data.

 

Every cloud storage company you talk to will claim to take top-of-the-line security measures on behalf of your data. But that, in a nutshell, highlights the problem with cloud storage. Your data is entrusted to a third party for safekeeping. It’s possible that they’d do everything in their power to safeguard your information. But bad things, like ransomware, phishing, or just plain going out of business, do happen. And when they happen, it’s not the cloud storage company whose data is on the line; it’s yours.

 

Even if that doesn’t occur, let’s be honest. Most of the major cloud storage companies are based in the United States, the U.K., or France, where they could be subject to NSA snooping (or questionably legal surveillance from any other government entity). Despite the best efforts of many storage companies to prevent government intrusion, your data could still be at risk, even when it’s locked up tight.

 

This brings us back to encryption, which is the hands-down best way to protect your data, period. It’s just like locking sensitive data in a box, with a password needed to reopen it. Even if someone gets ahold of the box, if they don’t have the password, there’s nothing they can do with it. There are a lot of encryption tools out there and you’ll want to make sure that you have the right one for your specific needs. If you ever need a recommendation, don’t hesitate to reach out and ask! We’ll be happy to provide you with the specific recommendation (free or paid) that fits your needs.

 

In addition, most cloud storage companies protect your data with their own encryption, but this isn’t as secure as encrypting your own information. That’s because the cloud storage company has the encrypted data in its possession, but it also has the keys to that data. If someone can get in, they can probably get the information they want. And a disgruntled employee — or just a hapless one — can also provide hackers access to the system through good old-fashioned human engineering.

 

If the cloud storage company is compromised, will your data be secured or unsecured? Well, if you’re encrypting your own data before uploading it, then the bad actors will open up the safe to find … a bunch of locked boxes. Pretty frustrating, right?

 

On the other hand, if you’ve trusted the cloud storage company to take care of everything, you’re going to have a bad day.

 

As you can tell, it makes sense to have your IT guy encrypt everything that gets put on the cloud before it gets there. But remember, just as your cloud storage provider is vulnerable, you can be vulnerable as well. It’s less likely that bad actors will target your company specifically, but if they want your data bad enough, they’ll go to great lengths to get it.

 

Many people have a misconception that these criminals will just use a magic program to crack your encrypted files. Decryption does exist, but it requires a lot of time and processing power. It’s far more likely that hackers will target your email or other aspects of your system and try to find out the encryption codes that way. And never forget that people are the weakest part of your IT security. Educate employees so they aren’t vulnerable to phishing scams, downloading questionable software, and visiting the wrong websites.

 

Present a “hard target” when it comes to your cloud storage, and seriously, make sure you or your IT guy encrypts your data before you put it online. 


AC Cartoon (500x330).jpg


Guest Article

Three Ways to Get Your Life Back

Dr. Geoff Smart

 

I was once meeting with an executive, and I noticed a small framed sign on her desk that read, Eat Lunch. When I asked about it, she said, “My job is all-consuming. If I am ever able to eat lunch, I’ll know that I got my life back.” Sound familiar? So many of us are capable business leaders and yet powerless to reclaim our lives from our jobs. But work is not supposed to be like that. And, if yours is, you need to do all three of the things I’ve listed below. Sorry, but to really get your life back, you have to do them all.

 

First, set personal goals, like how many nights per week you want to eat dinner with your family. Setting and tracking goals works. A CEO of a $20 billion company set a goal to be home from 6–8 p.m. (to spend time with his teenager) at least four nights a week, and he often beat that goal. An extremely busy tech entrepreneur set a goal to have a proper cellphones-off, two-week vacation every summer. An executive assistant in our New York office always wanted to coach her daughter’s soccer team, so she finally set the goal and did it.

 

Second, schedule personal time. I recently called a colleague at midday on a Thursday. He was at the zoo with his wife and two kids. We have a “freedom and flexibility” culture at ghSMART. If somebody is trying to schedule your time over one of your personal commitments, tell them you are not available. It’s none of their business why you are not available. It’s not either-or. You can be successful and have a life.

 

Third, delete, delegate, delay, and then (as a last resort) do. I saved the best tactic for last. Is your first instinct to do whatever the urgent, flashing, text-chiming, inbox pop-up task demands? That’s a lousy way to work, and it’s no way to live your life. Follow this sequence instead:

  • Your first instinct should be to delete any task. Sorry, task! You don’t own me.
  • If it has to get done, delegate it to a capable person who can do it.
  • If there is nobody to delegate it to, then delay the task until a time that works for you.
  • If that is not practical, then your last resort is to do that task now.

If you set personal goals, schedule personal time, and practice the delete-delegate-delay-do framework, you will find you can achieve career success and get your life back. And if you think these tactics are useful, please download our other free leadership tools at geoffsmart.com/smarttools.

 


 

Geoff (94x120).jpg

Dr. Geoff Smart is the No. 1 thought leader for the No. 1 topic in business: hiring and leading talented teams. Dr. Smart founded the leadership consulting firm ghSmart in 1995, a firm he still chairs today. He is also a nonprofit founder, government advisor, and Wall Street Journal best-selling author. 


 

Tech Tips: 5 Smart Things to Know Before Moving Your Data to the Cloud




Cloud computing is all the rage these days, and while some companies are moving their whole IT infrastructure to the cloud, many others are choosing to streamline their businesses by moving individual business applications.

If you are considering moving any of your company’s software applications “to the cloud,” this article will show you 5 important tips you should consider BEFORE pulling the trigger.

Fill out the form to gain instant access the article.


anti-spam Important! We hate spam as much (or more!) than you and promise to NEVER rent, share, or abuse your e-mail address and contact information in any way.

Client Spotlight: 

International Organization of Masters, Mates and Pilots 

Masters Mates and Pilots 

The International Organization of Masters, Mates & Pilots (MM&P) was created to protect the rights and working conditions of members of the seagoing maritime community. The union fulfills its mission by representing MM&P members in negotiations with ship-owners; supporting the efforts of other maritime unions to achieve decent working conditions; and working with international organizations to improve standards and conditions in the global maritime community.

 

MM&P seeks to improve the maritime working environment through political action and involvement in the regulatory process that shapes laws and regulations governing maritime work. The union is a dynamic advocate for its 7,500 members and a voice in Washington, D.C., for the domestic maritime industry and America’s Merchant Marine. 

 

DP Solutions provides technical consulting and iSeries Cloud Hosting services to MM&P Plans, a division of MM&P. This allows them flexible, scalable resources that are easy to manage and keeps their IT systems running at top performance without adding hardware to their infrastructure.

 

To learn more about Masters, Mates & Pilots visit http://bridgedeck.org/.