Get Smart About Mobile Devices

You must protect your network when you travel.

LeapFrog - Mobile Devices

I’m on the prowl for chances to intercept your data. SmartPhones, iPads, BlackBerrys and other mobile devices help you stay connected and allow you to take your data with you. Because they connect to the Internet using wireless connections, they present opportunities for bad guys to pick off the most sensitive company information. Next thing you know, I’m exchanging high fives with a hacker in the end zone.

PDN_MalWareDownloading the global address list and storing sensitive client information or email discussions on your mobile device adds risk of unauthorized disclosure.

Don’t fumble your data when using mobile devices:

• Kick that app. Be careful what you get at the app store. Applications and freeware often contain hidden viruses and spyware that could put your device and the information on it at risk.

• Block that Bluetooth! When not in use, change the default password for connecting to a Bluetooth-enabled device.

• Be a textual deviate. Your text messages are not secure. Texts are transmitted over your carrier’s network, not a secure company network. The files you send are not encrypted and won’t be scanned by your company’s network virus protection.

• Huddle up on WiFi. Free, public WiFi service can be extremely insecure. Don’t make it easy for me. Be your own WiFi hot spot.

• Kick the GPS habit. GPS is useful when you need it; but it can also publish your current and past locations. Turn it off unless in use.

• Use a playbook. Keep track of where your mobile device is at all times and lock it when not in use to prevent loss or theft.

Don’t let your mobile device get sacked. Protect — don’t neglect!

Lisa Martin CEO LeapFrog Solutions, Inc.

Lisa Martin
CEO
LeapFrog Solutions, Inc.

LeapFrog Solutions (LFS) is a certified woman owned small business based in Fairfax, Virginia. Founded in 1996, we are a trusted source for commercial businesses and federal agencies seeking full spectrum creative solutions and exceptional program management. This blogpost is brought to you by GTSC in partnership with LeapFrog Solutions. For more information on cyber awareness campaigns contact Anjali Dighe at 703.539.6127 or [email protected].

 

 

Spear Phishing: Getting Caught is a Drag

LeapFrog Phishing

I’m a Spear Phisherman. I want to catch the big one and reel it in! But I’m not talking about tuna; I’m talking about landing your personal information. Here’s my secret: I impersonate your friends, your bank and the people you trust to gain access to your computer and your network.

PDN_MalWareI’m pretty good. I know that you can’t always tell the difference from the real messages and the fake ones that I dangle in front of you. It doesn’t take long for me to gather lots of personal information about you — what you like, who you follow, what you purchase online and which websites you visit.

I use the information I find through open sources and develop personalized messages designed to trick you into believing they are from trusted entities. Spear phishermen like me can design emails, tweets, phone texts and even Facebook updates that access your private information after just one click.

Once you open the message, I trick you into giving me your user names, passwords or other office information, which allow me to access your network undetected. Little did you know that you just gave me the ability to take all the company information I would like.

It’s easy to avoid my targeted attacks and protect yourself against “Spear Phishing:”

  • Be stingy with your user name and password. Don’t share personal information with anyone. At all!
  • Don’t surf the Web chasing popular stories, blog posts, videos, etc. I love to hide in these sites, learn about your likes and dislikes and then target you.
  • Think before you click links from social media sites, emails or text messages. That’s the easiest way for me to catch your information.
  • Verify any caller before providing names and email addresses of your coworkers. Be the first line of defense.
  • Delete suspicious emails without opening them or responding to them. If it looks suspicious and you don’t know the sender, it could just be bait. Use caution!

It’s easy to protect your information against my traps and keep your personal and company information safe.

Protect — don’t neglect — your information against Spear Phishermen like Mal Ware. For more information, check out www.us-cert.gov.

Lisa Martin CEO LeapFrog Solutions, Inc.

Lisa Martin
CEO
LeapFrog Solutions, Inc.

LeapFrog Solutions (LFS) is a certified woman owned small business based in Fairfax, Virginia. Founded in 1996, we are a trusted source for commercial businesses and federal agencies seeking full spectrum creative solutions and exceptional program management. This blogpost is brought to you by GTSC in partnership with LeapFrog Solutions. For more information on cyber awareness campaigns contact Anjali Dighe at 703.539.6127 or [email protected].

 

CEO Highlight: Babs Doherty, Eagle Ray, Inc.

The Government Technology & Services Coalition talked with Babs Doherty, the CEO of GTSC company Eagle Ray, Inc., and got her advice for entering the Federal market and how to remain competitive.

GTSC: What is your first piece of advice for a company entering the Federal homeland and national security market right now? 

Babs Doherty: Prepare for a long road.  The acquisition cycle is over 2 years now due to sequestration and other budget cuts.  A small company cannot keep a bench of qualified candidates on hand for 2 years so you will need to plan ahead and keep your candidates up to date on the progress of any new business you are going after.  If you have an 8(a) status, then you may be able to move things along faster than 2 years but even those contracts are seeing delays longer than before.  So have a plan on how to grow your business over the long haul and be patient and persistent.  The work will come.   Also do not hesitate to team with solid primes.  Pay particular attention to any work share opportunities or areas that you are considered a subject matter expert to get the attention from the primes.  Most important, execute on any current work you have flawlessly.  You’ll need good, solid references to win additional work.

GTSC: What is one thing you “learned the hard way” and could help mentor another company?

Babs Doherty: When you are getting started in the business, you usually are a subcontractor before a prime.  Many times the primes provide you with “target” rates in order to be on their team.  Be careful to analyze EVERY rate carefully and do not bid on labor categories that are not your sweet spot, even though it is tempting.  Once you have provided your rates to the prime, they can, and do, bid any mix of those labor categories to win the work.  If you are not prepared to deliver a qualified person at that labor category price, you will be in trouble.  Check every labor category in a realistic way to ensure you can deliver a qualified candidate before you provide that rate to the prime.  Be prepared to negotiate but also be prepared to walk away if the prime cannot give you the rates under which you can deliver successfully

GTSC: The environment is very competitive.  How are you staying ahead of the curve/or afloat?

Babs Doherty: I am paying attention to my competition and the bidding trends.  The bidding trends are changing as the budget environment dictates tighter and tighter profit rates and escalation.  The government is desiring a true partnership from industry and wants to see that reflected in your bid (lower escalation, lower profit margins, creative bidding) to save money.  We are always looking at ways to deliver our services better than our competition and analyze other projects to see what works and what doesn’t.  We also want to show a strong bench or the ability to obtain highly qualified staff in a creative way.  Everyone says they have a data base of candidates.  It’s important to show other ways beyond a data base to maintain a qualified staff.  Lastly, be quick to respond to requests from your customers.  They will find other means to get what they want if it takes too long to get to an agreement or get the requirement fulfilled.

Babs Doherty CEO Eagle Ray, Inc.

Babs Doherty     CEO                 Eagle Ray, Inc.

EagleRay LogoEagle Ray, Inc. is a Lion’s Den member of the Government Technology & Services Coalition. Eagle Ray, Inc. takes a pragmatic, common-sense approach to organizational transformation, tailoring our  proven, systematized processes to meet your unique requirements. Our transformational approach is based first and foremost on common sense. Learn more about Eagle Ray, Inc. here

Ten Cyber Issues Board and Chief Legal Officers Need to Know (and Worry) About

Boards of Directors have several fiduciary duties to uphold. Meeting such duties requires addressing cybersecurity and data loss. While this rapidly evolving area has its own unique challenges, boards, as well as the legal officers who advise them, face the same question about how to address cybersecurity, data loss, and data theft as they do any other critical ssue-are they acting prudently, reasonably, and responsibly? More and more boards are now asking themselves, and the legal counsel who advise them, these questions and placing cybersecurity and data theft risks at a higher level of priority than even physical disasters. The factors highlight 10 areas boards and their legal advisors should consider before their companies are faced with a real-world cyber threat.

1. The stakes to share value and the bottom line are high. Cybersecurity and data theft may sound like abstract concepts, but they have impacts-including financial ones-in the real world. It’s been estimated that the global cost of cyberattacks in 2011 was $388 billion in direct financial loss and the cost of recovering from the attacks. Losses can take the form of stolen intellectual property or trade secrets, data destruction, disruption of critical systems, or even damage to physical assets. They also can include the exposure of customer and employee personal information. Any of these scenarios can result in material losses impacting a company’s reputation, bottom line, and share price.

2. The hackers are two steps ahead of you already. While today’s headlines are focused on standard types of data breaches and hacking activity-viruses, malware, physical break-ins, etc.-the next generation of threats, such as heretofore unforeseen attacks (so-called “zero day attacks”), has yet to make it into the public consciousness, but directors and their advisors have to be aware of them. The constantly mutating tactics cyber criminals employ will pose a serious challenge to any company that uses electronic systems. This means boards and their advisors, including GCs, will need to focus their attention on risk mitigation in this area for decades to come.

3. Cyber and data loss threats pose merger risks. Acquiring companies may be subject to significant losses and boards may be exposed to shareholder suits should adequate cybersecurity and other data protection measures not be taken in the context of corporate M&A activity. If a company acquires a target with a malware-infested IT system without appropriate due diligence to avoid that outcome, there is a potential for a wide range of liabilities. Cybersecurity and other data protection methods should be added to the long roster of criteria a board and its legal and business advisors use when evaluating a potential acquisition and acquisition documents should contemplate and provide for appropriate representations, warranties, and indemnities related to cyber thefts and attacks.

4. Lost or stolen intellectual property or customer or employee information can turn a deal from sweet to sour. Imagine your company acquires a target for hundreds of millions of dollars. Then their systems are hacked and the blueprints for the widget that made the company attractive are stolen. Knockoffs flood the market and the company’s value evaporates. Or imagine your company is about to launch a new software program, but it is swiped from your servers days before launch. Similar issues may arise if sensitive customer or employee data is exposed. Among the many questions that will be asked – by many, including investors, business partners and regulators – in the aftermath, is whether or not the board and its legal advisors acted with reasonable care to prevent such incidents.

5. There is a maze of state and federal data protection and data loss notification requirements to navigate.With State Attorneys General and an assortment of federal agencies, including the Federal Trade Commission, having a hand in data protection, breach notification, and disclosure requirements, companies should have plans in place for how to respond in a timely fashion should a breach occur (and, of course, be well-versed on its legal compliance obligations beforehand). The myriad disclosure and notification requirements and cybersecurity obligations will only grow and enforcement activity is likely only to increase, so it is incumbent on companies and their counsel to stay abreast of these developments.

6. The failure to be fully informed of and proactive against cybersecurity and data loss risks could lead to litigation. Companies, directors, and corporate managers could be exposed to litigation risks and potential liability for compromised data, systems, and infrastructure resulting from a cyberattack or data loss. Such claims could include third-party claims for breach of contract, breach of warranty, and/or statutory or common law legal requirements under both state or federal law; claims by state and federal regulators for failure to comply with specific data protection and cybersecurity laws (as well as more general unfair and deceptive trade practice-type laws), shareholder claims for breaches of fiduciary duty in failing to take appropriate steps to protect the company’s assets, and business from cyber theft or other cyberattacks; and for publicly traded companies, investor securities law claims and SEC actions for failing to adequately disclose cyber risks.

7. If the breach doesn’t get you, the litigation will. Even in those instances where a company or its directors are successful in defending a claim following a cyberattack or data loss, such litigation is likely to be expensive and a time-consuming distraction for management and the board. Beyond this, the cyberattack and the resultant attention from related legal proceedings could result in serious reputational harm.

8. There are federal programs available to help mitigate corporate liability through the SAFETY Act. Companies can gain valuable protections offered through an advanced approach to the Support Anti-Terrorism by Fostering Effective Technologies Act of 2002 (known as the SAFETY Act). This law provides tort liability protections for products and services that can be used to detect, defend
against, or respond to cyberattacks. It is essential that boards and their legal advisors be aware of
these programs and assess their applicability to cybersecurity products and services they either
procure or deploy on their own.

9. Insurance coverage is available through traditional or tailored policies. The demand for cybersecurity/data loss-specific coverage is incredibly high, placing pressure on availability, though some forms of traditional-and widely available-coverage such as Commercial General Liability may provide coverage for some types of claims. However, insurers are quickly working exclusions into these kinds of policies. Working with experienced coverage counsel can ensure the right kinds and amounts of coverage are in place.

10. Outside counsel comes with the benefit of attorney-client privilege.While there are armies of consultants at the ready to advise companies should a cyber or data loss incident occur, only legal counsel can offer the shield of attorney-client privilege, thereby ensuring that sensitive information about investigations cannot be used in litigation. Having your cybersecurity/data privacy attorney on speed dial is a good idea.

Is liability inevitable or can steps be taken to mitigate or eliminate it?
Cybersecurity and data loss liability and litigation is in a similar stage as environmental law in the
1970s: there has been a broad awakening that liabilities exist-and that they may be vast.
Companies have no choice but to assess their exposure and plan accordingly. That means in
today’s technology, dependent of business environment, it has become imperative that boards (or
their equivalents) and their business and legal advisors devote appropriate attention to
cybersecurity issues as a matter of good corporate practice and appropriate risk management.

This could mean causing management to (i) undertake a thorough cyber/data loss risk assessment
that includes both company-specific risks and risks to critical third parties that would adversely
impact the company, and (ii) identify and implement best practices relevant to the company’s cyber
and data loss risks.

Most importantly, boards and their senior management, including GCs, have to be aware of the
threats and have management take measures to mitigate them. Failure to do so could easily lead to
losses and liability.

By Divonne Smoyer, Brian E. Finch, & Emanuel Faust

Brian FinchQuestions? Ask GTSC’s Strategic Advisor!

Brian Finch
Partner, Dickstein Shapiro LLP
[email protected]
(202) 420-4823 
 
 
 
DISCLAIMER
The GTSC Legal Limits Brief is made available by GTSC for educational purposes only as well as to provide you with general informaiton and a general understanding of the law and legal changes that may impact your business, not to provide specific legal advice. No attorney client relationship is established with GTSC or our legal strategic partners by reading this brief. This information shold not be used as a substitute for competent legal advice from a licensed professional or attorney. Copyright © 2013. All Rights Reserved.

 

Removable Media: Do You Know Where That’s Been?

LeapFrog Tip #2 Removable MediaSteer clear of portable malware by using only secure removable media

Admit it. You can’t resist plugging those cute little USB thumb drives, miniature CD ROMS and other removable media devices into your computer. They’re easy to use, portable, convenient and they hold lots of data.

PDN_MalWareBut my hacker friends and I discovered that those nifty memory devices are a great way to get into your computer and your network — especially if you don’t know where they came from. We hand them out everywhere we go. Everybody wants one. We pre-infect them with malware or spyware. The second you plug them into your USB port, presto! I’m running around your computer, free and easy.

Sure, it’s handy to download files onto a thumb drive and take them home with you instead of lugging your laptop around. But humans have a propensity to lose things. People misplace their thumb drives or CD ROMS all the time. Because they are so small, it’s pretty easy to steal them, too.

But you can protect yourself, your computer and your network. Just follow these easy tips:

  • If you don’t know where it came from, don’t put it in your computer.
  • Safeguard your memory sticks. Keep them in a safe place.
  • Use encryption. Protect sensitive data on your thumb drives.
  • Print hard copies of documents and back up data on removable media.

Remember, losing a memory stick that contains important data could have severe consequences. Protect, don’t neglect! For more information, check out www.us-cert.gov.

Lisa Martin CEO LeapFrog Solutions, Inc.

Lisa Martin
CEO
LeapFrog Solutions, Inc.

LeapFrog Solutions (LFS) is a certified woman owned small business based in Fairfax, Virginia. Founded in 1996, we are a trusted source for commercial businesses and federal agencies seeking full spectrum creative solutions and exceptional program management. This blogpost is brought to you by GTSC in partnership with LeapFrog Solutions. For more information on cyber awareness campaigns contact Anjali Dighe at 703.539.6127 or [email protected].

Get Smart About Your Password

LeapFrog Banner #1You shared your password … now I know all your secrets. Don’t get exposed — be smart about your password!

PDN_MalWareThe attacker who writes my code is on the hunt for your password. Once he gets it, he inserts me, Mal Ware, into your network so he can see all the information that your employees need to keep private. I love taking secrets that aren’t mine and using them to do bad things. So don’t make it easy for me or your attacker.

Here are ways you can protect your information from my malicious intentions:

  • Keep your password to yourself. It’s supposed to be secret — so don’t share it!
  • Don’t be fooled by what others may say:
    • IT support does not need your password.
    • Your coworkers do not need your password to read your email. Share your inbox with another user or use a team email account.
    • Your assistant doesn’t need your password to do his/her job. You can give others access to your Outlook calendar and email.
    • Share file folder access with specific coworkers to avoid password sharing.
    • You don’t need to share your password with others to access the same sites or content management systems. Everyone with duties assigned on a system should have his/her own login and password.
    • Be creative to make your password uniquely yours:
      • Use a variety of symbols, letters, capital letters and numbers.
      • Avoid using words related to your company.
      • Avoid sequences or repetition of letters or numbers, words spelled backward, common misspellings or abbreviations.
      • Encourage others to be smart about their passwords. Make them aware of the threats that are out there if they share them, because once I have access to the network, I have access to everyone and everything.
      • A data breach could embarrass you and/or your company … or much worse.

It’s not difficult to avoid my threats. Just don’t share your password with anyone, and be smart when creating it. Protect, don’t neglect, your password! For more information, check out www.us-cert.gov.

Lisa Martin CEO LeapFrog Solutions, Inc.

Lisa Martin
CEO
LeapFrog Solutions, Inc.

LeapFrog Solutions (LFS) is a certified woman owned small business based in Fairfax, Virginia. Founded in 1996, we are a trusted source for commercial businesses and federal agencies seeking full spectrum creative solutions and exceptional program management. This blogpost is brought to you by GTSC in partnership with LeapFrog Solutions. For more information on cyber awareness campaigns contact Anjali Dighe at 703.539.6127 or [email protected].

Do You Know Where Your Employees Are?

gtsc_preparednessFollowing the attack at the Boston Marathon, so many people tried to reach their loved ones that wireless carriers couldn’t keep up with demand. When faced with calamity, we want to check on our friends and family and get information about what happened.

Don’t Make It Up As You Go Along

This need to receive and disseminate information following a catastrophe is important to businesses, too. You need to determine where your employees are and if everyone is safe. You need to make sure people know what they should do or where they should go. You need to reach out to your customers. In some cases, you need to talk to the press and answer their questions.

It is difficult, if not impossible, to come up with a coherent, comprehensive communications plan in the shadow of a crisis. Often, saying the wrong thing can haunt you for weeks or months after the event.

Plan Ahead, Communicate the Plan

Your building already has an occupant emergency procedure that covers evacuation during a fire or taking cover in the center of the building during a storm, but that plan doesn’t cover communication within your organization or to your clients.

Compose two types of alerts—internal and external. Internal alerts should be broadcast through email, overhead paging systems, voice messages, or text messages to employees. Internal alerts should include information about evacuation, relocation, assembly points and status updates, including telling employees when it is safe to return to the office. Let your employees know, as part of your disaster preparedness training, how you will communicate with them after a crisis.

External communication involves notifying employees’ families, discussing the situation with the press, social media status updates, and email to customers and clients. Each external message should be crafted to suit the intended audience. In the immediate aftermath, people will accept broad statements, but they will want more concrete information as soon as you can deliver it. Being prepared will make it easier to get the right message to the right people.

Communication is Mitigation

Once everyone is safe, you need to safeguard your business and your reputation. Planning what you will communicate, when you will communicate, and to whom you will communicate in the event of an emergency, may be the difference between a full recovery and a downward spiral. Customers, clients, the media, and your employees, will be reassured by clear, concise, professional communication if you’re business is faced with an emergency situation.

After a disaster or a disruption, you’ll have enough to handle. Don’t leave crisis communications to chance.

Lilly Harris CEO, MSA

Lilly Harris
CEO
MSA

Lilly Harris is the President and CEO of Man-Machine Systems Assessment. MSA is an Economically Disadvantaged Woman-Owned Small Business with 23 years of government contracting experience. MSA is passionate about our Warfighters and the preparedness of our nation. MSA works diligently to evaluate defense systems, ensure continuity of operations and support mission critical programs that are aligned with our passion and mission. 

Visit: www.msaincorp.com

Follow: @MSAincorp

What’s Your Ready Rating?

American Red Cross Ready Rating LogoThe Challenge

As a business leader, you can’t ignore the facts. Emergencies are inevitable, and as much as 40 percent of businesses never reopen following a disaster. We know the “what if?” is hard to think about and we also know the process for getting prepared can be cumbersome and complicated. Having an emergency preparedness plan in place also helps to ensure the health, welfare and peace of mind of your employees, their families and your business’s community while meeting your business needs.

The SolutionReady Rating Program Assessment

Since its inception, the Red Cross Ready Rating program (readyrating.org) has been recognized by preparedness experts as the necessary and easy solution to help businesses, organizations and schools become ready to respond to and successfully withstand a disaster and other emergencies.

Ready Rating is an easy, web-based, self-paced member program designed to help organizations of all sizes become better prepared for emergencies. Members complete a free online self-assessment of their current readiness levels and receive immediate customized feedback on each area of preparedness, including strengths and areas in need of improvement. Members then gain access to an information-rich Ready Rating program guide with tips to improve preparedness.

Learn more from Linda Mathes next week at GTSC’s National Preparedness Month program on Thursday, September 26!

 350
Linda Mathes
CEO
American Red Cross in the National Capital Region

 

Visit: www.readyrating.org

Follow: @RedCrossNCR

Linda Mathes, selected as a 2008 Washingtonian of the Year, is the Chief Executive Officer of the American Red Cross in the National Capital Region which includes the District of Columbia; counties of Arlington, Fairfax, Loudoun, Montgomery, Prince George’s and Prince William; and cities of Alexandria, Fairfax, Falls Church, Manassas and Manassas Park. Linda was recently invited to the White House to help recognize Red Cross Champions of Change. 

 

Beyond Fire Dills

gtsc_preparednessTurn on the news following a mass shooting and the witness describe the same scene: people barricading themselves in rooms, hiding under tables, scrambling for shelter as a shooter stalks through the building.

As unlikely as it seems, it is possible to prepare for this situation and make your workplace safer.

The Current Statistics

The FBI defines a mass shooting as an event where four or more people are killed.  USA Today used that definition to analyze 146 mass shootings during the last seven years and found that over 900 people had been killed in mass shootings. The Brady Campaign to Prevent Gun Violence defines a mass shooting as three or more people killed or injured in a single incident. Following their standard, they estimate more than 20 mass shootings per year in the US.

The Need for Drills

Practice makes perfect. Most of the victims or witnesses involved in a mass shooting were taught how to calmly evacuate a building in case of a fire as children, but almost none of them know how to react if they are faced with gunfire.  Conducting regular drills provides your organization with the muscle memory to respond effectively to an active shooter incident.

The Importance of Planning

In addition to drills and training, your business should plan for an active shooter as it would other disasters. We recommend the following best practices.

  • Devote a section of your Occupant Emergency Plan (OEP) to active shooter procedures
  • Train your existing staff and new hires to follow the procedures in your OEP.
  • Exercise active shooter procedures as you would fire drills, at least twice per year.
  • Planning will instill confidence and a create a culture of preparedness at all levels of your organization

The Comfort of Preparedness

Active shooters are not something most people want to think about, but avoidance won’t keep you, your employees, or your business safe. Remember too that we learn to exit buildings safely during fire drills in school and at work, and we have some idea how to proceed in other buildings if a fire breaks out. If you take the time to train your employees, they’ll have that information no matter where they go. Some parameters will change, but knowing the basics of how to behave in an active shooter situation may save their lives even if they aren’t at the office.

It’s easy to avoid uncomfortable topics, and we all do it. But don’t let discomfort lead to a lack of preparation. If you need help with active shooter preparation, we’re here to guide you and your staff through the process.

Lilly Harris CEO, MSA

Lilly Harris       CEO, MSA

Lilly Harris is the President and CEO of Man-Machine Systems Assessment. MSA is an Economically Disadvantaged Woman-Owned Small Business with 23 years of government contracting experience. MSA is passionate about our Warfighters and the preparedness of our nation. MSA works diligently to evaluate defense systems, ensure continuity of operations and support mission critical programs that are aligned with our passion and mission. 

Visit: www.msaincorp.com

Follow: @MSAincorp