Northern New Mexico College improves campus cybersecurity with Avast

| January 21, 2019

article image
Gains better visibility of cybersecurity health, improves threat protection with Avast Business Antivirus and management console. The College. Northern New Mexico College is known as the most affordable and diverse four-year college in New Mexico. With campuses in Española and El Rito, the college provides more than 60 bachelor, associate, and certificate programs to meet the educational, cultural, and economic needs of the region. Lead IT Specialist Chris Trujillo has worked at the college for 12 years and explains, “We’re a small college, and we offer a unique learning environment. Many of our students are returning to school later in life. We also have a large population of Hispanic and Native American students. All of these factors influence our culture and curriculum.” The Challenge. To meet the IT and cybersecurity needs of 1,000+ students and 400 faculty and administrative staff members, Chris works alongside a team of 10 led by IT Director Jimi Montoya. Says Chris, “Our biggest challenge is staying ahead of the unexpected and managing our time efficiently.

Spotlight

Three.

We want to make life easier for our customers by helping them get the most out of their mobile devices, offering real value from the services we provide and by removing the barriers that frustrate them. Since our launch in 2003, we have done things differently to other mobile operators. While others blocked internet services like Skype, we embraced the great things the internet brings to mobile. Our Feel At Home offer lets our customers call and text the UK and use data out of their UK allowance when abroad in a host of countries.

OTHER ARTICLES

Cybersecurity in Digital Marketing: Tips to Overcome Challenges

Article | August 9, 2021

No matter what business you run, digital marketing is crucial to reach out to people and generate leads today. Businesses of all sizes rely on digital marketing to take the business to the next level.Digital marketing in many forms, such as search engine optimization, social media marketing, email marketing, content marketing, and online advertisements, have been utilizing to bridge the gap between business and customers. Technology is evolving and is expected to be transformed further. As technology gets improved every second, online advertising and marketing opportunities are also getting amplified. However, the villain, cyber threats and attacks, can jeopardize your business dreams and opportunities. Yes, alarmingly, cybersecurity in digital marketing has become a serious concern today. The more the opportunity you have in digital marketing, the more you become vulnerable to cyber threats and attacks. Cybersecurity in Digital Marketing-Importance Cybersecurity is very significant as digital marketing heavily depends upon data and information, which are sensitive and confidential to your business. This confidentiality is to be maintained to retain your customers. If your business is affected by cyber-attacks, your customers lose trust in you and your business. That is because the customers think their data and information could be compromised or stolen. Therefore, you need a strong cybersecurity practice to save you and your customers from breaches and malware attacks. Apart from information loss, financial loss, loss of brand reputation, etc. too, can happen. Ultimately you may end up witnessing a crippling loss in your business. Thus cybersecurity in digital marketing is essential as threats and attacks are detrimental to your business. Cybersecurity in Digital Marketing- Challenges As all businesses are going digital now, cyber threats are expected to increase. As a result, according to Gartner, the information security market is projected to grow to US$170.4 billion in 2022. This warns businesses to be extra alert regarding the startling rate of cyberattacks. Organizations have to be ever ready with solutions. There are a lot of challenges faced by cybersecurity in digital marketing. Email marketing is an essential and powerful part of digital marketing. Email marketers face the challenges, such as phishing. Small businesses are the main targets of phishing activity as they are unaware of it. Hackers may send spam using your email accounts with virus-infected emails. Occurring continuously, the server may backlist or block your site, affecting your email campaign. Customers will lose trust in you. Content marketing is also vulnerable to cyber-attacks as hackers are well aware of content management systems (CMS) and how it works. Therefore, they can easily hack it and distribute malware. In addition, social media marketing is vulnerable to identity theft. In case a hacker cracks your password, he can do unimaginable damages to you and your business. The hacker can do unauthorized downloads, share your confidential data and information, and even exploit your customers. The above-mentioned are some of the cybersecurity challenges in digital marketing. In addition, e-commerce and customer relationship management (CRM) systems are also prone to cyberattacks and threats. Therefore, it is essential to take necessary cybersecurity measures to overcome becoming the prey of cybercriminals while performing digital marketing activities online. Overcoming Cybersecurity Challenges in Digital Marketing As businesses began to use digital marketing widely to reach out to customers successfully, organizations started getting exposed to cybersecurity threats. The consequences of breaches and malware attacks can be far-reaching. Therefore, it's high time for businesses to be ready to tackle these cybersecurity issues in digital marketing. The following tips may help companies to do it proactively. Training Your digital marketing executives are vulnerable to cyberattacks, especially those who are handling email marketing. To protect your campaigns, train all how to recognize a phishing email. Also, encourage them to use spam filters and strong passwords. SSL to Secure CRM Installing an SSL(Secure Sockets Layer) protocol on the website makes your data transfer secure and encrypted, eliminating the chances of hackers getting access. Also, your Customer Relationship Management (CRM) system should have strict data security policies. It helps you keep your data protected while your staff access sensitive data. Regular Data Backup Data loss can happen in many circumstances, such as ransomware attacks, hard drive damage or crash, or malware hijacking. These data losses will result in losing you a lot of money. Thus, encourage your staff to backup all data regularly in a different location other than your system. It will protect 100% of your data in case of cyber-attacks and system malfunction. Integrating Security Features As part of content marketing, businesses use Content Management Systems (CMS) to upload, edit easily, and publish different forms of content. However, as hackers are very familiar with CMS, they can damage your reputation by distributing malware if they hack your site. Thus, it is very much crucial to integrate security features in your CMS platform. In addition, many vulnerabilities could be closed off by installing security plug-ins. The following security measures also can be taken regarding your CMS. Use strong password Change the default admin login URL Do not use public Wi-Fi networks to access your CMS These cybersecurity measures in digital marketing are necessary as content marketing is part and parcel of the process. Regular audits Ensuring cybersecurity is a team effort and is a continuous process. The set-and-forget policy will not work with cybersecurity. Your company's measures taken regarding cybersecurity in digital marketing have to be audited regularly to ensure your cybersecurity goals are met correctly. The audit should be done at least once a quarter. Summing Up It is a time-consuming process to devise strategies to protect businesses from cyber-attacks and threats. However, unless you take necessary measures in time, your business can be jeopardized, losing clients, money, and reputation. Cybersecurity threats in digital marketing are expected to increase as technology is getting transformed every second. A stitch in time saves nine! Frequently Asked Questions Why is cybersecurity so important in digital marketing? Cybersecurity benefits your brand by protecting your website and each of your digital marketing activities. It saves all your data as well as the data of your clients. However, cyber-attacks can be detrimental to your business. What is the biggest problem in digital marketing? Apart from standing out from the competitors, the biggest problem in digital marketing is cyber-attacks and threats. Unfortunately, cyberattacks can jeopardize your business. { "@context": "https://schema.org", "@type": "FAQPage", "mainEntity": [{ "@type": "Question", "name": "Why is cybersecurity so important in digital marketing?", "acceptedAnswer": { "@type": "Answer", "text": "Cybersecurity benefits your brand by protecting your website and each of your digital marketing activities. It saves all your data as well as the data of your clients. However, cyber-attacks can be detrimental to your business." } },{ "@type": "Question", "name": "What is the biggest problem in digital marketing?", "acceptedAnswer": { "@type": "Answer", "text": "Apart from standing out from the competitors, the biggest problem in digital marketing is cyber-attacks and threats. Unfortunately, cyberattacks can jeopardize your business." } }] }

Read More

Post-Pandemic Tech Job Market: The Good, Bad and Ugly

Article | August 30, 2021

As we emerge from the worst pandemic in a century, many public- and private-sector employees and employers are reassessing their options within technology and cybersecurity roles. Are boom times coming soon for tech companies, cybersecurity professionals and others? Marketplace.org recently posted the headline, “Are we headed for a Roaring ’20s economy?” Here’s an excerpt: “A year ago, when most of the country was under stay-at-home orders and people were losing jobs at an unprecedented rate, we asked three people who study economic history to explain whether the recession on the horizon was going to look anything like the Great Depression. “With the vaccine rollout well underway, weekly unemployment claims at their lowest level since the pandemic began and consumer confidence rising, we’ve asked them about a different historical comparison: the 1920s.” Meanwhile, NBC News reported “There are now more jobs available than before the pandemic. So why aren't people signing up?” Here’s a quote from that piece: “The number of job vacancies soared to nearly 15 million by mid-March, but discouraged, hesitant and fearful job seekers means many positions are still unfilled, according to new data from online job site ZipRecruiter. “Online job postings plunged from 10 million before the start of the pandemic last year to just below 6 million last May, as lockdowns and shutdown orders forced businesses to close their doors and reduce or lay off workers.” Meanwhile, according to KPMG in the U.K., tech’s job market is growing at the fastest pace in two years. “The move towards new remote and hybrid working arrangements, new spending priorities for businesses around IT infrastructure, automation and the huge shift to online retail are likely to provide a long-term boost to sales and investment in the tech sector,” said KPMG’s chair Bina Mehta. One more — thecyberwire.com just reported that the skills gap is getting wider regarding cybersecurity jobs: “The cybersecurity industry is projected to triple year-over-year through 2022, yet the workforce shortage still stands at millions worldwide. With a 273 percent increase in large-scale data breaches in the first quarter of 2020 alone, employing more cybersecurity professionals is a pressing challenge for both companies looking to hire in-house and cybersecurity agencies alike. “According to the International Information System Security Certification Consortium, there are now more than 4.07 million unfilled cybersecurity positions across the world. Despite high entry salaries, recession-proof job security and plentiful career opportunities, there are simply not enough trained cybersecurity professionals to fill the skills gap.” BAD TREND — AND EVEN SOME UGLY MIXED IN I recently posted a story from the Atlanta Journal-Constitution on LinkedIn entitled “Employers are hiring again but struggling to find workers.” Here’s an excerpt: “Chris New said he has turned down $250,000 in business because he just can’t hire enough laborers and drivers at his Carrollton-based company, Barnes Van Lines. “There are plenty of people without jobs, but unemployment benefits give them too much incentive not to work, he said. ‘We advertise and nobody comes in looking for a job. A lot of people are taking advantage of the system. It’s really killing us.’” Although the focus on this article was not technology or cybersecurity jobs, many of the comments were tech- and cyber-related. Marlin Brandys: So how do they explain people like me with a B.S. in networking and cybersecurity and an NCSP both from 2020 and I can’t even get an interview for a tier 1 help desk job? All these posts and stories from corporate America, universities, government agencies selling the bogus skills gap and shortage story. This platform alone has 1,000s of cyber qualified people able and willing to work in entry level positions at entry level pay and benefits. Stop the madness already. I applied for unemployment 01/08/2021. It’s now 04/19/2021 and I haven’t seen a dime of unemployment compensation. I’ll gladly take an entry-level position in cyber. Quinn Kuzmich: Marlin Brandys - Honestly one of the unspoken truths of the security industry is age discrimination. Sad but true. Dave Howe: Quinn Kuzmich - broadly true across all of IT though. They stand around demanding someone "do something" about the "skills shortage" but exclude 90% of candidates based on an arbitrary checklist, and 75% more based on illegal age, sex or race discrimination, disguised as "culture fit" Joseph Crouse: Marlin Brandys you're overqualified. Marlin Brandys: Joseph Crouse, I wish I could believe that. For some types of positions in the teaching or instructing silo maybe, for entry level information security I do not believe so. Dave Howe: Marlin Brandys - it's difficult to tell. I have seen "entry level" roles demand a CISSP and CEH. Gregory Wilson: 300+ applications and 4 interviews... No job yet... Overqualified, not enough experience, ghosted.... REALITY — I'm over 60 and nobody will hire me... All the BS aside, there are lots of people ready to work... Pay them what they're worth! Dave Howe: I think there is a bigger picture. Welfare shouldn't be so generous as to encourage people to stay on it, but equally, it shouldn't be so stingy as to cause people to struggle to stay afloat (meet rent, put food on the table, however basic, keep the power on) — there is need for balance. Equally though, an entry -evel role where a worker is willing to put in a nominal 40 hours at a routine, boring but not dangerous or unpleasant job should pay sufficient after expenses so as to be able to afford some luxuries above and beyond what welfare provides — if you are no better off, then that job is underpriced and needs either automation to improve output so as to make paying more a better proposition, or automating entirely and the job eliminated. If the job is dangerous, distasteful or involves unsociable hours, then that should be reflected in the pay, above and beyond what a "basic" job should provide. The answer should never be "we need to cut welfare so that they will take my crappy, low paid job out of desperation, because adding automation means upfront costs and I don't want to pay any more" You can join in on that LinkedIn conversation here: SOLUTIONS, PLEASE This Forbes article offers some interesting perspectives on how both employers and employees can succeed in the coming post-COVID cybersecurity world, while offering a new model for our future workforce: “Cybersecurity is a striking example of where the supply-demand gap for personnel is particularly volatile, with companies routinely lacking both the technology and available human capital needed to integrate relevant, highly skilled workers at the same speed as their unprecedented digital transformation. When the COVID-19 pandemic forcibly distributed security teams, organizations were given a new perspective as to how remote teams can de-risk innovation. Now, many are moving to industrialize the 'new normal' of cybersecurity with greater efficiencies across their internal programs and the software development life cycle by seamlessly integrating expert security talent on-demand.” While this coming boom may not be good news for state and local governments who struggle to compete with the private sector for the most talented tech and cyber staff, there are new options opening up for public-sector employees as well. This research finds that many retirees want to come back and work 10 to 20 hours a week, especially if they can work remotely. Many groups are training workers for the post-pandemic job market. I also have spoken with CISOs and other technology leaders in both the public and private sectors who are much more open to hiring out-of-state workers, even though they would never have allowed that before the pandemic. And finally, what about those who can’t find work, despite the supposed “boom times” that are coming? Last year, I wrote this blog describing why some skilled cyber pros are still not getting jobs. Here are just a handful of the reasons I listed there: People are living or looking in the wrong places. They want a local job and do not want to move. (Note: More remote hiring is happening now with COVID-19, but it is still unclear if many of these jobs will go “back to the office” after the pandemic. This leads to hesitancy in taking a job in another part of the country.) Insistence on remote work. While this is easier during the pandemic, some people want 100 percent remote without travel, which can limit options. Also, some hiring managers are not clear if remote jobs will last after the pandemic restrictions are lifted, so they want to hire locally. Company discrimination due to older worker applicants. Yes, I agree with my colleagues that this is alive and well in 2020. Other forms of discrimination exist as well, such as race and gender. Lack of professional networking — especially true during COVID-19. They don’t have personal connections and have a hard time meeting the right people who are hiring or can help them find the right job. Attitude, character, work ethic, humility, etc. I have written several blogs just on this topic, but some people never get the job because they come across in interviews as entitled or too angry or having a bad attitude. They scare off hiring managers. For more on this topic, see “7 reasons security pros fail (and what to do about it)” and “Problem #3 for Security Professionals: Not Enough Humble Pie” and “Problem 5: Are You An Insider Threat?” Putting this all together, I love my brother Steve’s perspective on individual career opportunities and selling your ideas (and yourself) to those both inside and outside your organization: “It’s all about the right product at the right place at the right time at the right price — with the right person delivering the message to the right decision-maker.” FINAL THOUGHTS During a recent vacation to northern Arizona, I found myself working in a coffee shop surrounded by several men and women that were supporting global companies with technology projects. Conversations were all over the map regarding application enhancements and complex deliverables for some industry-leading names. I was frankly a bit shocked that all of this work was being run out of a coffee shop — with a few video conference calls to people’s homes. The “new normal” of global workforces became more of a reality to me, and I see this trend accelerating even after the pandemic. Article Orginal Source: https://www.govtech.com/blogs/lohrmann-on-cybersecurity/post-pandemic-tech-job-market-the-good-bad-and-ugly

Read More

Guest Blog: Cyber security guidance for remote working

Article | March 20, 2020

In these challenging times, it’s sad to learn that cyber criminals are only increasing their activity as they look to capitalise on the Covid-19 crisis. With the NCSC (National Cyber Security Centre) issuing warnings of such activity on a daily basis, it’s important that we all work to protect our businesses from the damage of cybercrime. As many of us move to working from home, the opportunity for cyber attacks only increases, so it’s vital that we work together with our IT colleagues to adopt good cyber health practices. If you are working from home, you should only be using a VPN (Virtual Private Network) or a secure home network with strong end-to-end encryption; e.g. Office 365 SSL session. Don’t be tempted to use public wifi, as hackers can position themselves between you and the access point.

Read More

Cybersecurity: Five Key Questions The CEO Must Ask

Article | December 15, 2020

Just about every single day, somewhere in the world, a company falls victim to cyber attackers, even with millions spent on cybersecurity. Every company is a target because they have data and there are too many doors, windows and entryways for cyber attackers to get in, whether on-premise or in the cloud. It is not a question of if, but when, the attackers will get in. Prevention efforts are of course important, but since attackers will get in, equal attention must be on detection going forward. And the focus must be on early detection, otherwise, it will be too late. My book, Next Level Cybersecurity, is based on intensive reviews of the world’s largest hacks and uncovers the signals of the attackers that companies are either missing or don’t know how to detect early, apart from all of the noise. So, the attackers are slipping by the cybersecurity, staying undetected and stealing data or committing other harm. In the book I explain the Cyber Attack Chain. It is a simplified model that shows the steps that cyber attackers tend to follow in just about every single hack. There are five steps: external reconnaissance; intrusion; lateral movement; command and control; and execution. At each step, there will be signals of the attackers’ behavior and activity. But the signals in the intrusion, lateral movement and command and control steps provide the greatest value because they are timely. The external reconnaissance step is very early and the signals may not materialize into an attack, while detecting signals in the execution step is too late because by this time the data theft or harm will have already occurred. My research uncovered 15 major signals in the intrusion, lateral movement and command and control steps that should be the focus of detection. My research of the world’s largest hacks reveals that if the company had detected signals of the attackers early, in the intrusion, lateral movement or command and control steps, they would have been able to stop the hack and prevent the loss or damage. My book shows how to detect the signals in time, using a seven-step early detection method. One of the key steps in this method is to map relevant signals to the Crown Jewels (crucial data, IP or other assets). It is a great use case for machine learning and AI. There is a lot of noise, so machine learning and AI can help eliminate false positives and expose the attackers’ signals early to stop the hack. There are two blind spots that just about every single company world-wide faces that cyber attackers will exploit, beginning in 2019, that companies must get on top of. One blind spot is the cloud. There is a false sense of comfort and lack of attention to detection, thinking the cloud is safer because of the cloud provider’s cybersecurity or because the cloud provider has an out-of-the-box monitoring system. However, if the company fails to identify all Crown Jewels and map all relevant cyber attacker signals for the monitoring, the attackers will get in, remain undetected and steal data or commit other harm in the cloud. The other blind spot is Internet of Things (IoT). IoT devices (e.g. smart TVs, webcams, routers, sensors, etc.), with 5G on the way, will be ubiquitous in companies world-wide. While IoT devices provide many benefits, they are a weak link in the chain due to poor built-in security and lack of monitoring. Cyber attackers will focus on IoT devices to make the intrusion, then pivot to get to the Crown Jewels. Detecting early signals of cyber attackers trying to exploit IoT devices will be critical. Companies world-wide need to make cybersecurity a priority, starting in the board room and with the CEO. It all starts at the top. My intensive reviews of the world’s largest hacks reveal in each case a common theme: inadequate or missing CEO and board cybersecurity oversight. Here are five key questions from my book that the CEO must take the lead on and together with the board ask of the management team to make sure the company will not become the next victim of cyber attackers and suffer significant financial and reputational harm: Have we identified all of our Crown Jewels and are not missing any? Do we know where all of the Crown Jewels are located? Have we identified all of the ways cyber attackers could get to the Crown Jewels? Have we mapped high probability signals of cyber attackers trying to get to the Crown Jewels with each Crown Jewel? Are we sifting through all of the noise to detect signals early and reporting to the CEO and the board in a dashboard report for timely oversight? If your answer is No to any of the questions or you are unsure, you have a gap or blind spot and are at risk, and you must follow up to get to a high confidence Yes answer. In my book, Next Level Cybersecurity, I provide other key questions to ask and a practical seven-step method to take cybersecurity to the next level to stay one step ahead of the attackers. It is written in plain language for boards, executives and management, so everyone can get on the same page and together mitigate one of the most significant and disruptive risks faced today, cybersecurity.

Read More

Spotlight

Three.

We want to make life easier for our customers by helping them get the most out of their mobile devices, offering real value from the services we provide and by removing the barriers that frustrate them. Since our launch in 2003, we have done things differently to other mobile operators. While others blocked internet services like Skype, we embraced the great things the internet brings to mobile. Our Feel At Home offer lets our customers call and text the UK and use data out of their UK allowance when abroad in a host of countries.

Events