Home » Uncategorized » Cyber Security Awareness Month 2014: Protecting Critical Infrastructure & The Internet of Things
protecting critical infrastructure

Cyber Security Awareness Month 2014: Protecting Critical Infrastructure & The Internet of Things

This is the second article in our series for National Cyber Security Awareness Month. To read the first article, click here.

Interconnectivity is fundamental to modern life. On a grand scale, the systems supporting our transportation, telecommunications, banking and other necessities all rely on their ability to connect. Every day, even before we power up our laptops and smartphones, we depend on a properly functioning network infrastructure.

The same is true within many organizations, which rely on complex networks for data sharing and third-party connections for daily functioning and core operations. To stay competitive, organizations have needed to adapt to the mobile revolution, allowing employees to connect to their networks through mobile devices. And while this change has helped make workforces more flexible and productive, it has also led to a more complicated networking arrangement.

Recent news and analysis offer some pointed examples of how problems can arise with the extended connectivity fundamental to modern business. In the massive breach of Target’s network, for instance, cyber criminals found their point of entry through a remote connection owned by an HVAC vendor. Further, researchers claim that mobile devices are now, and will continue to be, a significant source of vulnerabilities for corporate networks.

This month, in our efforts to increase your organization’s cyber security awareness, there are a few important steps you can take to improve the security of your critical infrastructure.

1. Know your providers. As in the Target example, cyber criminals are increasingly honing in on companies’ third-party vendors to find a way into networks. Lunarline offers complete vendor audits to ensure you catch weak links before they become a major issue.

2. Get your plans in order. Protecting your infrastructure includes quick and decisive action in the event of a major breach. To be prepared, you need to develop a breach response plans and make sure all parties involved have a clear understanding of their roles and responsibilities.

3. Enhance mobile security. Out of the box, many mobile devices are not up to the proper standards of most organizations’ security programs. This means you need to identify mobile security risks and develop a tailor plan for addressing them.

For more information on how Lunarline can help you protect your organization’s critical infrastructure, visit us at Lunarline.com, or contact us today.

About Spence Witten

Spence has somehow survived ten years at start-ups and small businesses without suffering a (major) nervous breakdown. As Lunarline's Director of Federal Sales, Spence actually loves working on proposals. If there were any doubt, this is proof that he is in fact certifiably insane. While his title says "Sales" Lunarline doesn't let him off that easy. We make him do real work, too. Luckily he's a recognized subject matter expert in security policy and loves helping clients navigate their way around tricky security compliance standards. He's also been known to lead a software development initiative or two, though that pretty much always ends poorly for everyone involved. He can be reached at spence.witten@lunarline.com.