Page 119

and following it for businesses and consumers.” Some solid advises Mr. Levin gave were: using strong passwords or getting a password manager; enabling 2-factor identification; creatively changing memorable answers to security questions; staying away from public wi-fi and using VPN for better protection; updating and backing-up your data; shredding; freezing credit; changing default passwords of IOT devices; checking and being mindful of credit scores and signing up for transactional monitoring alerts; thinking of more sophisticated monitoring programs; and looking at explanations of health insurer benefits where there are multiple charges due to fraud.

“The 3rd M is manage the damage,” Mr. Levin pointed out. “It really has to do with knowing who to call and knowing what to do. In a business you would create a breach response plan, game this plan, and know you would have to respond urgently, transparently and empathetically. As a consumer, many institutions have programs available either to policy holders, account holders or employees, so (they can) check with insurance agents, financial services organization, and HR departments and find out how to be part and the cost is one of the cheapest investments you can make versus the agony and financial loss you can have,” he warned.

“The culture of security and acting on things today is very important,” Mr. Keen added. “A variety of different service partners can provide installations of hardened security equipment, like how a network is setup.” He gave examples of considering implementing guest wi-fi that can be configured on your behalf, and staying on top of security patches and firmware updates, as well as monitoring – all which are readily available services and solutions by providers.

Mr. Keen agreed, “be partial to action, these suggestions are easy and free or inexpensive if implemented today. Think of the prevalent use of mobile phones and whether security has changed to meet those demands.”

Ms. Fowler highlighted that it is also a culture of resiliency, “where the internet is a part of our lives and we need to exercise resiliency.. and have a response plan.” Some questions to think about are, “who would you call as a family as victims of a breach; whether you have an attorney ready with something more serious, like physical attempts and ransomware, and also knowing how to access financial institutions with bigger problems and whether people have and test backups to make sure they work. She noted that when going away on travel, it is good practice to have other ways to access funds than a primary credit card as a backup plan. “Basic hygiene includes having a response plan,” she stated.

“Technology is moving at breathtaking pace and families should discuss with children and elderly and monitor use online. Often adversaries are coming with sense of urgency, if too good to be true, it likely is, either with big discounts and savings or fear of quick force like threats of governments coming to your home. Take a breath and think about things before doing things that could open you up and expose you,” Ms. Fowler noted. In response to one of the audience questions, Mr. Levin creatively added, “when you say the word portfolio, the Pavlovian response of most people is investments - but the truth is we also have other portfolios in our lives – we have our credit and our identity, and have to be professional managers, because business, governments, and truthfully, consumers have not done enough, there needs to be a shared responsibility of cooperation, collaboration and communication… It is incumbent upon us to help one another. The

Profile for Athleisure Mag

Athleisure Mag Oct 2018