|| Print ||
|Monday, May 05, 2014|
BY DON MORRISON | OB GUEST CONTRIBUTOR
You’ve grown and nurtured your business, and you want to protect it. But, in today’s world of the internet and technology, installing an alarm system is no longer enough to secure your company. While the technology renaissance we have gone through has certainly benefited consumers and businesses alike, it’s also brought a new vulnerability with it – the emergence of cybercrime.
Cybercrime…it seems like such a simple word, however its simple identifier fails to portray the true magnitude of its risks. For the most part, cybercrime falls into one of two categories, digital piracy and broader information attacks.
Digital piracy involves the illegal duplication, sale or use of unlicensed software. This could be as basic as installing a program on two computers when you only hold one license, or as complex as a crime ring producing counterfeit versions of the latest Windows operating system. Meanwhile, information attacks involve a broad range of tactics that may involve malware, viruses and other means to glean data, or personal information, from a target.
We all know running a business, especially a small business, is challenging and it’s normal to look for ways to cut costs – especially when it comes to IT. And digital pirates prey upon this behavior. Digital piracy is one area where the old adage, “if it sounds too good to be true, it likely is,” definitely rings true.
You may even ask, “Well, Don, is it really so terrible to download the same software on two computers?” The answer is yes. Utilizing a single software license on two devices means only one device will receive the regular security updates and patches from the manufacturer, opening your network to increased risk from information attacks. And software found online for far below market value is also likely pirated, and may include malware and viruses. In fact, in their study, The Link between Pirated Software and Cybersecurity Breaches, IDC recently found that U.S. businesses are expected to spend $22 billion in 2014 dealing with security issues associated with pirated software.
Meanwhile, information attacks involve a broad range of tactics that may involve malware, viruses and other means to glean data from a target – and are not always associated with pirated software. While piracy often involves a tangible asset, information attacks are much more subvert and hard to identify.
So you say, “Don’t worry Don, I’m a small business, cybercriminals are after the big fish in the water.” Wrong again. Criminals are increasingly targeting SMBs who often do not have the same level of security or are less likely to ensure machines have all the latest updates. And data breaches are expected to cost U.S. businesses another $75.5 billion in 2014, according to IDC. With information attacks increasingly being led by organized crime syndicates and sophisticated operations, their effectiveness and risk to businesses continues to climb. For the U.S., 93 percent of business losses are expected to be the result of criminal organizations.
Both digital piracy and information attacks bring with them their own unique range of IT threats for businesses, and while they may overlap at times, each requires its own security measures. Just because a business purchases only legal genuine software, doesn’t mean they are immune from the risks of information attacks. Meanwhile, that amazing deal you got on productivity software may include hidden malware and bots designed to siphon off customer data and account information without your knowledge.
“Great Don, you have my attention, but what can I do?” The good answer is all businesses, despite their size, can decrease their risk of being the victim of cybercrime – without breaking the bank! With three simple steps, you can secure your IT network and protect your business from today’s cybercriminals.
Ultimately, knowledge is power, and a few simple steps can have a tremendous impact on your information security. Technology is an area where if it sounds too good to be true, it likely is – and a little commonsense goes a long way.
Don Morrison, Director of U.S. Anti-Piracy at Microsoft, resides in Portland, Ore.
Wednesday, August 19, 2015
BY GINA BINOLE
Screening for “culture fit” has become an essential part of the hiring process. But do like-minded employees actually build strong companies — or merely breed consensus culture?
Tuesday, August 04, 2015
Friday, July 10, 2015
BY LINDA BAKER
Market of Choice is on a tear. In 2012 the 35-year-old Eugene-based grocery chain opened a central kitchen/distribution center in its hometown. The market opened a third Portland store in the Cedar Mill neighborhood this year; a Bend outpost broke ground in March. A fourth Portland location is slated for the inner southeast “LOCA” development, a mixed-use project featuring condos and retail. Revenues in 2014 were $175 million, a double-digit increase over 2013. CEO Rick Wright discusses growth, market trends and how he keeps new “foodie” grocery clerks happy.
Wednesday, August 19, 2015
BY JACOB PALMER | DIGITAL NEWS EDITOR
One of the hottest new investment trends has proven quite lucrative for some companies.
Monday, August 03, 2015
BY JASON E. KAPLAN | STAFF PHOTOGRAPHER
You may have noticed the photos of our rural health innovators departed from the typical Oregon Business aesthetic.
Wednesday, August 19, 2015
BY BRIAN LIBBY
Ben Kaiser holds his ground.
Tuesday, July 14, 2015
The Big One serves as an allegory for Portland, a city that earns plaudits for lifestyle and amenities but whose infrastructure is, literally, crumbling.
|Child care challenge|
|Is there life beyond Reed?|
|Back to School|
|Ninkasi grows to NY|
|Eco challenges facing Oregon|
|Adidas produces special shoe for upcoming Timbers/Sounders match|
|Intel invests $60M in drone company|
|Congestion should be expected|
|How many devices are using Windows 10?|
|Aftermath of the Ashley Madison hack|
Transforming the culture of Oregon’s educational leadership.
The Board dismissed a petition related to efforts to unionize the Northwestern University football team.
Every once in a while we receive a letter in the (fictional) mailbag that is tough to describe and quite compelling. This week, Isabel, the new HR manager at LabCo (and someone who is new to HR), wants to know whether she may fire the owner’s son for having an Oregon medical marijuana card. In passing, Isabel also makes a number of alarming admissions about her motivation. Here is Isabel’s nerve-racking question and our response to it.
Oregon Sick Leave is here, and changes to the federal white-collar worker regulations are on the way. This workshop will prepare you for both. We invite you to participate in an interactive discussion on how to start planning now for the future impact on your operations and finances.
Presented by OEN + CENTRL + YESpdx.
This Roundtable will cover numerous issues under the employer "shared responsibility" rules of the Affordable Care Act, including how to track the "full-time" status of variable-hour employees, temporary or seasonal employees, and employees who experience a change in status or a break in service. Additionally, we will provide a brief overview of Code sections 6055 and 6056, which require most mid-sized and large employers to submit their first information reports to the IRS in early 2016 regarding the health insurance coverage being offered to employees. We invite you to participate in an interactive discussion on how to prepare for the future impact of the shared responsibility rules on your operations and finances.