24.08.2023 Views

FALL 2023

Distributor's Link Magazine Fall 2023 / Vol 46 No 4

Distributor's Link Magazine Fall 2023 / Vol 46 No 4

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

26<br />

THE DISTRIBUTOR’S LINK<br />

Joe Dysart<br />

Joe Dysart is an Internet speaker and business consultant based in Thousand Oaks,<br />

California. A journalist for 20 years, his articles have appeared in more than 40<br />

publications, including The New York Times and The Financial Times of London.<br />

During the past decade, his work has focused exclusively on ecommerce.<br />

Telephone: 631-256-6602; web: www.joedysart.com; email: joe@dysartnewsfeatures.com<br />

CYBERSECURITY: MANY FASTENER DISTRIBUTORS<br />

ARE DOUBLING-DOWN ON RISK TRAINING<br />

Given that punking humans is still one of the easiest<br />

ways for a hacker to penetrate the most sophisticated<br />

of cyberdefense systems, many fastener distributors are<br />

doubling-down on training their employees to be on the<br />

look-out for the latest hacker scams.<br />

“Most security and risk leaders now recognize that<br />

major disruption is only one crisis away,” says Richard<br />

Addiscott, senior director analyst, Gartner (www.gartner.<br />

com), a technology advisement firm. “We can’t control<br />

it, but we can evolve our thinking, our philosophy, our<br />

program and our architecture.”<br />

Granted, most of us know by now that we need to<br />

exercise care when clicking on external links, deciding<br />

whether or not to download an attachment, or offering<br />

up password and other information to someone on the<br />

phone who seems like an employee who simply got<br />

locked-out of the company’s network.<br />

But the plain fact is that despite this common<br />

knowledge, hackers keep tricking many of us into allowing<br />

them to penetrate our business networks in just these<br />

ways to wreak havoc, steal critical company data or hold<br />

an entire system hostage with a demand for a ransom.<br />

This vulnerability has become even more troublesome<br />

in the post-Coronavirus Era, in which millions of employees<br />

worldwide are now ‘remote workers.<br />

In the process, that change also instantly made<br />

innumerable corporate networks at fastener distributors<br />

and other businesses even more vulnerable as remote<br />

employees log onto business computer networks with<br />

non-cyberprotected personal smartphones, personal<br />

digital assistants, laptops and other computerized<br />

CONTRIBUTOR ARTICLE<br />

UNFORTUNATELY, HACKERS CONTINUE TO PLAY CAT-AND-MOUSE<br />

WITH BUSINESS COMPUTER NETWORKS<br />

devices.<br />

Add an increase in hacker break-ins on cloud-based<br />

systems, a jump in hacking attacks orchestrated by<br />

nation states -- and increasing hacker access to tricks<br />

and techniques powered by artificial intelligence -- and it<br />

becomes clear that nothing less than 24/7 vigilance by<br />

fastener distributors will be needed to simply thwart the<br />

cybercriminal threat moving forward.<br />

Fortunately, if you’re looking to refresh or deepen<br />

the cybersecurity training you give to employees to<br />

help safeguard your business, there are a raft of<br />

training service providers that offer a number of different<br />

approaches to realizing that goal.<br />

Some training courses can be completed in an<br />

hour-or-so. Others can be permanently embedded in<br />

a fastener distributor’s computer network, continually<br />

probing employee ability to identify – and avoid – common<br />

hacker tricks.<br />

CONTINUED ON PAGE 122

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!