ata security is a growing concern for businesses across all industries, especially when it comes to protecting digital assets at remote or rural sites. Adding to the challenge is the persistent shortage of skilled security specialists and semiconductor chips—exacerbated by the COVID-19 pandemic. However, companies can adopt strategic measures, such as using a third-party provider, to augment their technical resources and safeguard their information.
Today companies are placing a greater, and much warranted, emphasis on data security. As cyber criminals constantly find new ways to attack, identifying emerging threats is paramount. Phishing attacks, where hackers try to trick people into revealing private information, remain the single biggest threat to businesses, according to Christian Cheatham, senior solutions architect at Alaska Communications. “Phishing emails can come from trusted vendors’ or coworkers’ email addresses that have been compromised,” Cheatham says. “The tell-tale signs of phishing have become harder to spot, requiring even more vigilance from employees. Employee awareness training remains the best, first defense against business email compromise.”
A cyber insurance policy is another precaution, but some providers are pulling back on ransomware payment benefits. According to Director of GCI Security Architecture and Planning Mitch Kitter, cybersecurity professionals widely believe that most ransomware incidents occur because organizations are not taking basic safeguards such as security patching, spam filtering, and other measures; therefore, insurance companies do not want to pay benefits to companies that fail to deploy fundamental cybersecurity solutions. Furthermore, adds Justin Darin, senior manager of cybersecurity and information assurance with Virginia-based Leonardo DRS, insurance is of no use to customers whose data is compromised, as it mainly protects companies from liability.
Director of Security Architecture and Planning
GCI
Leonardo DRS
For eighteen years, Leonardo DRS has consistently delivered cost-efficient, reliable, and scalable information and communication technology solutions throughout Alaska’s challenging environments, Darin says. The company, which primarily provides schools and health clinics with broadband services and optimized network applications like video teleconferencing, also offers enterprise solutions: managed services, technology support, cybersecurity, and network operations. “Leonardo DRS is dedicated to providing all its customers, no matter the size, with the best-fit and most comprehensive cybersecurity services that include the high security of our core network and satellite services to transport customers’ data anywhere in the world,” Darin says. “We maintain our system to the highest levels of security, which has allowed us the ability to be assessed and authorized by the US government and Department of Defense.”
GCI
Many of the organizations that Alaska Communications supports in rural Alaska are healthcare providers. The healthcare industry sees a high rate of targeted attempts to steal personal data, Cheatham says. For a healthcare customer, it’s important to have a robust end-point detection and response and email security platform.
nensuria | iStock
nensuria | iStock
nensuria | iStock
nensuria | iStock
In rural Alaska, it’s not uncommon for businesses or government agencies to offer free WiFi to the public, Cheatham says. Therefore, segregating network traffic between corporate and guest is an important safeguard.
Protecting large data sets with backups has been an essential function for organizations for decades, Kitter says. But in remote sites, limited bandwidth may make it more time consuming to copy large data sets to cloud storage providers. “For organizations that backup their data to tape or optical media, it can be more difficult to store that media in a location far enough away to be isolated from local events such as storms and earthquakes,” he says.
This becomes a more daunting obstacle in locations where hardware is not readily available.
For businesses that are looking to implement a new IT setup within a thirty-day window, the chip shortage can cause several different issues. The first is cost: Companies that need a specific piece of hardware during the shortage will pay a premium price to acquire it quicker. This could lead to a situation where they may not have enough funding to implement other parts of their security plan or obtain all the hardware or staff requirements to maintain the network’s security after implementation.
Another problem that can result from the chip shortage is that it may prevent companies from meeting their hardware needs all together. “This could lead to a change in your security approach,” Darin says, “and potentially lead to some vulnerabilities within your system being left open due to the inability to obtain the infrastructure to properly secure it.” He recommends a life-cycle plan for IT systems and sticking to it to avoid surprises.
Although semiconductor supply chain disruptions are frustrating for businesses and consumers, working with a provider that has relationships across the logistics spectrum can make a difference. “We help our business customers meet their deadlines through our extensive partner network and purchasing power,” Cheatham says.
nensuria | iStock
nensuria | iStock
AndreyPopov: iStock
AndreyPopov: iStock
Cheatham says Alaska Communications advocates layers of security, which provide multiple defenses against cyberattacks. “For businesses located in rural areas, security solutions may depend on the type of connectivity they have,” he says. “In most cases, we’d recommend slightly different solutions for businesses with terrestrial broadband than those with satellite connectivity. For example, for a business using satellite connectivity, we’d recommend their firewall be hosted by their broadband provider at its satellite earth station.”
Cheatham, like Darin, also points out that the rise in remote work is a factor that businesses need to consider when planning their cybersecurity strategy. “As the workforce becomes more spread out, we’re assisting our customers in setting up their remote workers with proper security tools to protect themselves and the company,” he says. “For remote workers, it’s important to have tools like content filtering, firewalls, and VPN solutions.”
chaolik | iStock
chaolik | iStock
Between the increasing regulatory requirements—such as Cybersecurity Maturity Model Certification requirements for defense contractors—and those coming from insurance companies as a condition of coverage, rural organizations are having to address cybersecurity to continue to be competitive. Security products can seem overwhelming and unattainable, Cheatham says. But many businesses can benefit from working with a trusted partner that can create a solution to meet their needs and budget. Even in rural Alaska, cybersecurity services are as close as the nearest keyboard.