{"id":10740,"date":"2012-03-05T13:02:00","date_gmt":"2012-03-05T18:02:00","guid":{"rendered":"http:\/\/devweb.rjrinnovations.com\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\/"},"modified":"2016-10-13T10:20:48","modified_gmt":"2016-10-13T14:20:48","slug":"cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2","status":"publish","type":"post","link":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\/","title":{"rendered":"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 8"},"content":{"rendered":"<p>\u00a0Testimony of Bill Conner, President and CEO of Entrust<\/p>\n<p>Before the Subcommittee on Communications and Technology<br \/>of the Energy and Commerce Committee<br \/>U.S. House of Representatives<\/p>\n<p>Part 8<\/p>\n<p>Security 101<\/p>\n<p>&#8220;Finally, to truly secure your environment, you need a layered,  identity-based security solution. You cannot have security and trust  without knowing who or what is on both ends of a transaction.&#8221;<\/p>\n<p>The good news? There are inexpensive and intuitive tools to combat this  kind of threat. So what are small and large enterprises, financial  institutions and governments to do?<\/p>\n<p>First, in my mind, are the cybersecurity basics \u2014 or table stakes, as  you might call them \u2014 for online security. Employees must have at least  basic training on security practices to protect sensitive business  information, communication and transactions.<\/p>\n<p>Organizations also need to ensure that computers and networks are  protected from viruses, spyware and other malicious code. A firewall  must be in place \u2014 not only at the point of connection to the Internet  but on all computers, including laptops used to conduct company  business. And, finally, the proper settings must be routinely checked  for vulnerabilities and attacks.<\/p>\n<p>Education, coupled with dedicated perimeter security solutions, provide  the first basic layer of protection for businesses and its employees.<\/p>\n<p>Another key to cybersecurity across an organization pertains to the  downloading of software. I cite Brian Kreb&#8217;s blog from May 2011 \u2014  &#8220;Krebs&#8217;s 3 Basic Rules for Online Safety&#8221; \u2014 where he gave three basic  rules for online safety in this area.<\/p>\n<p>\u00a0\u00a0\u00a0 First, &#8220;If you didn&#8217;t go looking for it, don&#8217;t install it.&#8221; You are  taking a great risk by downloading software that you don&#8217;t directly  know. \u00a0\u00a0\u00a0 Second, &#8220;If you installed it, update it.&#8221; Basically, keep up with  new versions of software because they include updated security for  vulnerabilities that have been found in earlier versions. \u00a0\u00a0\u00a0 And finally, &#8220;If you no longer need it, remove it.&#8221; Unneeded  software can slow down your machine and eventually open it to a wider  array of breaches. In the end, it is all about keeping networks,  computers and devices protected to help thwart the opportunity for  someone to breach your infrastructure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0Testimony of Bill Conner, President and CEO of Entrust Before the Subcommittee on Communications and Technologyof the Energy and Commerce CommitteeU.S. House of Representatives Part 8 Security 101 &#8220;Finally, to truly secure your environment, you need a layered, identity-based security solution. You cannot have security and trust without knowing who  [&#8230;]<\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[39],"class_list":["post-10740","post","type-post","status-publish","format-standard","hentry","category-blog-fr","tag-english-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>&quot;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&quot; - Part 8 - RJR Innovations<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&quot;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&quot; - Part 8 - RJR Innovations\" \/>\n<meta property=\"og:description\" content=\"\u00a0Testimony of Bill Conner, President and CEO of Entrust Before the Subcommittee on Communications and Technologyof the Energy and Commerce CommitteeU.S. House of Representatives Part 8 Security 101 &#8220;Finally, to truly secure your environment, you need a layered, identity-based security solution. You cannot have security and trust without knowing who [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\/\" \/>\n<meta property=\"og:site_name\" content=\"RJR Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/\" \/>\n<meta property=\"article:published_time\" content=\"2012-03-05T18:02:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-13T14:20:48+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RJRInnovations\" \/>\n<meta name=\"twitter:site\" content=\"@RJRInnovations\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 8\",\"datePublished\":\"2012-03-05T18:02:00+00:00\",\"dateModified\":\"2016-10-13T14:20:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\\\/\"},\"wordCount\":353,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"keywords\":[\"English @fr\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\\\/\",\"name\":\"\\\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\\\" - Part 8 - RJR Innovations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\"},\"datePublished\":\"2012-03-05T18:02:00+00:00\",\"dateModified\":\"2016-10-13T14:20:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 8\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"name\":\"RJR Innovations\",\"description\":\"Connect your business... All of IT\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rjrinnovations.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\",\"name\":\"RJR Innovations\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"contentUrl\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"width\":400,\"height\":237,\"caption\":\"RJR Innovations\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/RJR-Innovations-107107129324171\\\/\",\"https:\\\/\\\/x.com\\\/RJRInnovations\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/rjr-innovations\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/RJRInnovations\"]},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\" - Part 8 - RJR Innovations","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\/","og_locale":"fr_FR","og_type":"article","og_title":"\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\" - Part 8 - RJR Innovations","og_description":"\u00a0Testimony of Bill Conner, President and CEO of Entrust Before the Subcommittee on Communications and Technologyof the Energy and Commerce CommitteeU.S. House of Representatives Part 8 Security 101 &#8220;Finally, to truly secure your environment, you need a layered, identity-based security solution. You cannot have security and trust without knowing who [...]","og_url":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\/","og_site_name":"RJR Innovations","article_publisher":"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","article_published_time":"2012-03-05T18:02:00+00:00","article_modified_time":"2016-10-13T14:20:48+00:00","twitter_card":"summary_large_image","twitter_creator":"@RJRInnovations","twitter_site":"@RJRInnovations","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\/#article","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\/"},"author":{"name":"","@id":""},"headline":"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 8","datePublished":"2012-03-05T18:02:00+00:00","dateModified":"2016-10-13T14:20:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\/"},"wordCount":353,"publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"keywords":["English @fr"],"articleSection":["Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\/","url":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\/","name":"\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\" - Part 8 - RJR Innovations","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/#website"},"datePublished":"2012-03-05T18:02:00+00:00","dateModified":"2016-10-13T14:20:48+00:00","breadcrumb":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-8-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rjrinnovations.com\/fr\/"},{"@type":"ListItem","position":2,"name":"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 8"}]},{"@type":"WebSite","@id":"https:\/\/www.rjrinnovations.com\/#website","url":"https:\/\/www.rjrinnovations.com\/","name":"RJR Innovations","description":"Connect your business... All of IT","publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rjrinnovations.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rjrinnovations.com\/#organization","name":"RJR Innovations","url":"https:\/\/www.rjrinnovations.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","contentUrl":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","width":400,"height":237,"caption":"RJR Innovations"},"image":{"@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","https:\/\/x.com\/RJRInnovations","https:\/\/www.linkedin.com\/company\/rjr-innovations","https:\/\/www.youtube.com\/user\/RJRInnovations"]},{"@type":"Person","@id":""}]}},"_links":{"self":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/comments?post=10740"}],"version-history":[{"count":0,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10740\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/media?parent=10740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/categories?post=10740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/tags?post=10740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}