Inside Self-Storage

MAY 2019

Inside Self-Storage (ISS) is an information source for industry owners, managers, developers and investors covering news, trends, facility operation, finance, real estate, construction, development, marketing, technology, insurance and legality.

Issue link:

Contents of this Issue


Page 39 of 47

Y our self-storage business is going great. It's profitable and successful. Then, suddenly, burglars break in and steal a laptop. Or a well-meaning employee clicks on a malicious link that freezes your data, and someone demands $5,000 in bitcoin ransom to release it. Or an employee gets an e-mail that appears to be from the owner requesting a transfer of $2,500 to someone who appears to be a supplier, but it's actually a cybercriminal. Mounting a Cyber Defense By Kelly Wilkins TECH TALK Why does cybersecurity matter to your operation? Because cybercrime is profitable. As long as the bad guys are making money, they'll keep doing it. And they're getting better at it. Businesses are getting smarter, too; but it's like an arms race, and cyber criminals are winning. A Growing Problem Cybersecurity isn't just for large companies, though those are the ones we tend to hear about in the news. Small businesses can be also be attacked and may have fewer defenses. In fact, broad-based cyberattacks may target groups of small businesses. One of the largest breaches ever (Target) started through an attack on an HVAC contractor who had access to the retailer's information systems. It's been wisely said that data security is about people. It starts and ends with you. You're the best defense. The human factor is truly the sneak threat—and not just criminals, but your own loyal, long-term, devoted employees. Even when they have the best of intentions. People are helpful, predictable, busy, trusting, habitual and careless. Training and increased awareness have helped, but it hasn't solved the problem completely. Let's look at some of the biggest cyberthreats today and how you can mount a defense against them. Spear Phishing Spear phishing is a customized, e-mailed attack on a specific company, maybe even a specific employee. It's targeted and has research behind it. These aren't the old phishing e-mails from a fake Nigerian prince, with typos all over them. A spear phishing message looks legitimate at first glance. Spear phishing uses a "spoofed" or falsified e-mail address from the name of an actual owner or high-level employee in your company. It typically begins with a generic question like, "Are you in the office?" If you respond, it'll often lure you to a fake website to invade your information system. It may install malicious software on your computer or give hackers a portal to steal information. Best defenses: Caution and verification. These e-mails often sound urgent and appear to come from a person of authority. Look closely at the e-mail address. Don't respond directly. Verify it by some other method, like calling or starting a new e-mail to confirm. It's been wisely said that data security is about people. It starts and ends with you. You're the best defense. 38 ISS I May 2019

Articles in this issue

Links on this page

Archives of this issue

view archives of Inside Self-Storage - MAY 2019