8Written by Daniel D. Whitehouse, Esq.

If 2020 has taught us anything, it is that you should expect the unexpected. Last week, Garmin—a popular multinational technology company and maker of an array of products for athletes—was the victim of a ransomware attack that took down many of its services for several days, sending their customer base into an internet frenzy. Hackers are becoming more sophisticated and businesses remain their main target, largely due to the wealth of data each business retains. Information such as trade secrets, confidential communication, customer information, and HR records are stored on company’s computers, and protecting this information must be a top priority for any company. It only takes one security breach or unexpected disaster to make a company leader regret not having sufficient processes in place to store, recover and utilize their data.

Businesses need a proactive, documented plan called a Crisis Management Plan that anticipates potential threats and guides the restoration of operations in the event of a physical or digital disaster. Cyberattacks and data breaches can cost companies many thousands of dollars (oftentimes millions), lost time, revenue, and credibility. Additionally, staying abreast (or finding someone who is) of ever-changing current industry laws and regulatory compliance is particularly important. If you are not skilled in these areas, it is important to consult with professionals who are. A few areas to start assessing your business’ Crisis Management Plan include the following:

  • Building and Maintaining a Secure Network
    1. Install and maintain a firewall and router configuration to protect cardholder data. A firewall is a piece or set of software or hardware designed to block unauthorized access to computers and networks.
    2. Update passwords (and ensure they are secure passwords).
    3. Train Employees.
  • Maintaining a Vulnerability Management Program
    1. Protect all systems against malware and regularly update anti-virus software or programs.
  • Implementing Strong Access Control Measures
    1. Access control is a security technique that regulates who or what can view or use resources in a computing environment. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access control limits connections to computer networks, system files and data.
  • Regularly Monitoring and Testing Networks;
    1. Test your network and team with realistic attacks. Monitor complex networks involving multi-site distributed applications
  • Maintaining an Information Security Policy
    1. An information security policy is a set of rules enacted by an organization to ensure that all users of networks or the IT structure within the organization’s domain abide by the prescriptions regarding the security of data stored digitally within the boundaries the organization stretches its authority.

By preparing your Crisis Management Plan before a time of crisis, a company can stay ahead in this ever-changing world of global pandemics and cybersecurity. In the end, Garmin was criticized only for slow communication back to their customers, but reports the company was able to recover its data from backups and stated, “We have no indication that any customer data, including payment information from Garmin Pay, was accessed, lost or stolen.”

Although those Garmin users who could not upload or access their data for a few days might have wanted a faster Crisis Management Plan plan; from a business standpoint, I say, well done, Garmin. Well done.


ABOUT DANIEL D. WHITEHOUSE, ESQ.

WHITEHOUSE & COOPER, PLLC

Daniel D. Whitehouse entered the legal profession with more than a decade of experience in the information technology (IT) industry and managed the IT infrastructures of some of the world’s largest companies.  Mr. Whitehouse brings his unique blend of technology, law, and business experience to his clients of his firm, Whitehouse & Cooper. He is a member of The Florida Bar, the Orange County Bar Association, and the Lake County Bar Association. He participates in numerous sections and committees within these associations and serves on the OCBA Technology Committee and is past chair. He is admitted to practice in all Florida state courts and the Middle District of Florida. He is available for speaking presentations adaptable to seminars, virtual seminars, college classes, webinars, panel discussions or podcasts. Visit his website for more information at https://www.whitehouse-cooper.com/.

Previous articleCandidates for Board of County Commissioners – District 1
Next articleYou Have Until 7 pm To VOTE In The Primary Election