FALL 2023
Distributor's Link Magazine Fall 2023 / Vol 46 No 4
Distributor's Link Magazine Fall 2023 / Vol 46 No 4
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
26<br />
THE DISTRIBUTOR’S LINK<br />
Joe Dysart<br />
Joe Dysart is an Internet speaker and business consultant based in Thousand Oaks,<br />
California. A journalist for 20 years, his articles have appeared in more than 40<br />
publications, including The New York Times and The Financial Times of London.<br />
During the past decade, his work has focused exclusively on ecommerce.<br />
Telephone: 631-256-6602; web: www.joedysart.com; email: joe@dysartnewsfeatures.com<br />
CYBERSECURITY: MANY FASTENER DISTRIBUTORS<br />
ARE DOUBLING-DOWN ON RISK TRAINING<br />
Given that punking humans is still one of the easiest<br />
ways for a hacker to penetrate the most sophisticated<br />
of cyberdefense systems, many fastener distributors are<br />
doubling-down on training their employees to be on the<br />
look-out for the latest hacker scams.<br />
“Most security and risk leaders now recognize that<br />
major disruption is only one crisis away,” says Richard<br />
Addiscott, senior director analyst, Gartner (www.gartner.<br />
com), a technology advisement firm. “We can’t control<br />
it, but we can evolve our thinking, our philosophy, our<br />
program and our architecture.”<br />
Granted, most of us know by now that we need to<br />
exercise care when clicking on external links, deciding<br />
whether or not to download an attachment, or offering<br />
up password and other information to someone on the<br />
phone who seems like an employee who simply got<br />
locked-out of the company’s network.<br />
But the plain fact is that despite this common<br />
knowledge, hackers keep tricking many of us into allowing<br />
them to penetrate our business networks in just these<br />
ways to wreak havoc, steal critical company data or hold<br />
an entire system hostage with a demand for a ransom.<br />
This vulnerability has become even more troublesome<br />
in the post-Coronavirus Era, in which millions of employees<br />
worldwide are now ‘remote workers.<br />
In the process, that change also instantly made<br />
innumerable corporate networks at fastener distributors<br />
and other businesses even more vulnerable as remote<br />
employees log onto business computer networks with<br />
non-cyberprotected personal smartphones, personal<br />
digital assistants, laptops and other computerized<br />
CONTRIBUTOR ARTICLE<br />
UNFORTUNATELY, HACKERS CONTINUE TO PLAY CAT-AND-MOUSE<br />
WITH BUSINESS COMPUTER NETWORKS<br />
devices.<br />
Add an increase in hacker break-ins on cloud-based<br />
systems, a jump in hacking attacks orchestrated by<br />
nation states -- and increasing hacker access to tricks<br />
and techniques powered by artificial intelligence -- and it<br />
becomes clear that nothing less than 24/7 vigilance by<br />
fastener distributors will be needed to simply thwart the<br />
cybercriminal threat moving forward.<br />
Fortunately, if you’re looking to refresh or deepen<br />
the cybersecurity training you give to employees to<br />
help safeguard your business, there are a raft of<br />
training service providers that offer a number of different<br />
approaches to realizing that goal.<br />
Some training courses can be completed in an<br />
hour-or-so. Others can be permanently embedded in<br />
a fastener distributor’s computer network, continually<br />
probing employee ability to identify – and avoid – common<br />
hacker tricks.<br />
CONTINUED ON PAGE 122