W W W. M A I N E B I Z . B I Z 35 A U G U S T 7 , 2 0 1 7
A good security policy, says Benton,
categorizes the kind of data a com-
pany works with and how it should be
treated — considerations such as who
has access, how data are communicated
internally and outside the organization,
and encryption protocols.
Security awareness training is also
key, he says. It comes down to the
human factor.
"Phishing emails are quite good, and
if you have that one person who clicks
on anything, you'll get hacked," he says.
"Training tries to build in through the
organization, 'Here's what you look for
in a suspicious email. Here's what you
look for in a link or website.'"
Experts say the problem will
only grow.
"It's always a game of cat and
mouse, and it seems the good guys are
playing catch-up all the time," says
Simonds. "We do a lot to block what the
crooks are doing, and they'll fi gure out
how to up their game and fi nd a new
way around it. Now you have nation-
states with unlimited budgets and
manpower and brilliant people. It's a
challenge. I don't see it going away."
L S , M a i n e b i z s t a f f
writer, can be reached at
@
. a n d
@ M R E I
IT security giving
you a headache?
Contact SymQuest for
a free security assessment.
Don't leave your network vulnerable to hackers.
Request a free network security assessment at:
Resources.SymQuest.com/ITsecurity
SymQuest.com | 1.800.374.9900
F O C U S
P H O T O / T I M G R E E N WAY
Bob Noel, director of marketing
and strategic partnerships at
Plixer, says there's no all-in-
one solution for detecting and
fi xing security breaches.