Extended Q&A – Expert Panel: What Steps Should You Take If You Find Out Your System Has Been Hacked?
Technology | Connections Editor | Jun 3 2021
During Applied Net 2020, a panel of expercts that featured Shaun Lopez (Millennium Alliance Group LLC), Collin Passman (The Signature B&B Companies) and David Gerlach (Applied Systems) got together to discuss the "Steps Should You Take If You Find Out Your System Has Been Hacked". The panel covered telltale signs to look for if your system has been hacked, as well as the steps that you need to take immediately from both a Business Management and IT Administration Standpoint once you find that your system has been compromised. What follows are key questions raised by attendees and answered by the panelists after the session wrapped.
Q: Ghosting = Spoofing?
A: Yes. [Editor's Note: Read more about "spoofing" here.]
Q: What was the name of [the] training campaign vendor [you mentioned]?
Q: Who do we contact at Applied [Systems] for the White Paper?
A: Contact your sales representative, or click here if you are struggling to get in touch.
Q: Do we as an office have to backup everything ourselves, or is that done by Applied?
A: There needs to be a combination of both, which we touched on during the session. Your data is still yours and anything not Applied Systems related needs to be backed up locally.
Q: How does Applied protect its cloud from ransomware or hijackers accessing our data via the cloud infrastructure?
A: We suggest that you request this information from your Applied representative.
Q: Once you find that your email has been hacked, are you required to report that to your state? Are notifications required to go to insureds/clients as well?
A: You are required to notify your clients. Legal representation will notify all federal and civil authorities that are necessary. This should be part of your plan.
Q: We have a secure Wi-Fi password for our network, as well as a guest password for employees to use on their personal devices. Does this help with any issues of employee cell phones, laptops, etc. interfering with our network?
A: Yes it does. We have the same set up. People who access your system from within and are your employees should use a secure employee network which gives them rights to areas that guests will not have access to.
Q: As far as phishing texts, are you compromised if you open the text or just if you click a link inside the text?
Q: What was the password storage software name [that you mentioned]?
A: We mentioned both Okta and LastPass.
Looking for more education on Applied Systems? Check out Applied Client Network's webinars and webinar replays, and don't forget to register for Applied Net 2021!
Tags: Technology , Applied Net , Cybersecurity , User Tips , Security