Close Menu
    Facebook X (Twitter) Instagram
    Community Updates
    • Quick Custom Intelligence Marks 6 Years of Transforming the Future of Casino Gaming
    • SkyCity Entertainment Group Expands Strategic Partnership with Quick Custom Intelligence
    • G2E Asia and Asian IR Expo Return This May, Driving Digital Innovation Across Gaming, Entertainment, and Integrated Resorts
    • QCI Introduces New Operational Solutions at IGA 2026
    • QCI Advances Dispatch Capabilities with Modernized, Fully Integrated Platform
    • QCI to Showcase AGI56.1 at IGA 2026, Accelerating Performance Across Tribal Gaming Operations
    • QCI Launches QCI RV, Turning Casino RV Parks into High-Value Revenue Engines
    • QCI to Showcase Agentic Platform Capabilities at IGA 2026
    Gaming & Leisure
    • Archives
      • Gaming & Leisure Magazine Archives
    • Employment Dashboard
    • Research
    • News
      • G & L Community
      • Gaming
      • Hospitality
      • Travel
      • Restaurants
    • Awards
      • Annual Gaming & Hospitality Industry Awards Entry Packet
      • G&L Platinum Award
      • G&L Transformation Award
      • G&L Partner Award
      • G&L Innovation Award
    • G&L Roundtable
      • Overview
      • Exec. Attendee Registration
      • Property Attendee Golf Only
      • Sponsor Information
      • Sponsor Registration
      • NBP Sponsor Registration
      • NBP Special Registration
      • Industry Roundtable Insights
      • Photos
      • G&L’s Health & Safety
    • G&L Forum
      • Executive Registration
      • Sponsor Registration
      • Photos
        • G&L Forum Photos
        • G&L Forum Reception Photos
        • G&L Forum Executive Document
    • About
      • About G&L Business Partners
      • G&L Business Perspectives
      • Contact Us
      • G&L Board
      • G&L Business Partners
      • G&L CEO
      • G&L Editorial Residents
      • G&L Overview Media Kit
      • G&L Privacy Notices
      • Resources
    • G&L Portals
      • Business Partner Portal
        • Submit G&L Social Post
        • Submit G&L Voice Ad
        • Submit Web Banner Ad
        • Submit G&L Magazine Ad
        • Submit For G&L Monthly
        • Submit G&L Business Package
        • Submit Your Positions Available
        • Submit Press Release
        • Submit to Calendar of Events
        • Add/Update Your Logo
        • Payments & Terms
      • Editorial Portal
        • Step 1: Please Confirm You’ll Submit for the Upcoming Edition or the New & Cool Advertorial.
        • Step 2: Submit for the Upcoming Edition
        • New Writer Onboarding
    • Calendar
    • Subscribe
    Gaming & Leisure
    You are at:Home»Article»CYBERSECURITY 411: A CRASH COURSE IN PROTECTING YOUR BUSINESS FROM HACKERS

    CYBERSECURITY 411: A CRASH COURSE IN PROTECTING YOUR BUSINESS FROM HACKERS

    June 3, 2019 Article Security
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The number and scale of hacking attacks continues to grow exponentially, with cybersecurity trying to leapfrog ahead of increasingly sophisticated attacker techniques. Companies like yours are realizing how vulnerable they really are, even if the hackers are three guys in a basement halfway around the world. There’s nothing you can do that will make you totally safe, but you can certainly take action to improve your odds.

    Businesses are under assault like never before from hackers. An estimated 43% of businesses (almost half!) incurred cybersecurity breaches within the last 12 months. Even more alarming is a revelation in Ponemon Institute’s 2018 study for IBM that the average time it takes to identify a data breach is 196 days. That’s more than six months!

    Cybercrime is metastasizing for the same reason online services have become so popular: increasingly accessible technology. Hacking is easier than ever thanks to the ever-growing number of online targets and proliferation of off-the-shelf attack software available across the dark web. The shrewdest crooks are selling turnkey hacking tools to criminal wannabes.

    Improving your company’s digital resilience to cybercrime involves a multi-faceted approach along three major fronts:

    1) Protecting Your Family Jewels

    The personal and financial info you have in your databases is crack for criminals, which has led entrepreneurs to devise a dizzying array of options for defending against cyberattacks, data breaches, proprietary information loss and basic denial-of-service attacks.

    Proactive security solutions (patching systems or running anti-virus software on endpoints) can fix vulnerable code and stop viruses or malware from infecting your systems. Make sure you install these software updates promptly. It’s also a good idea to reevaluate anti-virus and firewall offerings every year given the flood of new technologies coming to market (like intelligent firewalls that use AI to enhance machine learning and thwart intruders).

    To prevent ransomware from interrupting access to records and payment systems, make sure your system backup/restore plans are bulletproof. And be sure to verify your offsite storage vendor has adequate security measure and encrypts your data as well. The Financial Industry Regulatory Authority (FINRA) has a definitive cybersecurity checklist on its website – it’s a great planning resource.

    Good password hygiene and two-factor authentication will help combat fraudsters who hack login credentials or buy the data breaches of business and consumer email accounts from the dark web. As more data is stored in the cloud, restrictive data permissions take on added importance. Limit the information you share with vendors and suppliers as much as possible.

    2) Defending Your Digital Flanks

    As your IT infrastructure distributes more processing outside the central computer room, more attention should be paid to every end-point in the network. Take your POS terminals, for example. How often are they inspected to prevent tampering? Are you employing end-to-end data encryption and virtual private networks to keep financial transaction data from being pilfered? If you accept mobile payments, are you using a dedicated (versus a multi-purpose) device to mitigate risks? It all adds up.

    Speaking of mobile devices, smartphones have become central to our lives, which makes them glitter like gold to fraudsters. About 60% of fraud now comes from mobile devices. Smartphones can be infected any number of ways – malware embedded in a downloaded app, email/text phishing schemes, etc. Once a cyber criminal has access to your mobile device, all of the apps that make it easy for you to buy things make it easy for someone else to do the same.

    One of the best ways to gain insights into hackers’ evolving tactics is to follow announcements from the Black Hat and DEF CON security conferences. Every August, these twin hacker cons cover a vast range of hacking research and are good predictors of new trends emerging in the cybercrime communities.

    Right now, there are three big trends to watch: Over the next few years, we can expect to see more sophisticated attacks targeting smartphones, internet of things devices (which roll off assembly lines with weak, if any, built-in security) and voice-based systems (Amazon Echo, for example). These will be harder to defend against, so it’s important to recognize the vulnerabilities inherent in these devices. One more thing to keep in mind: The majority of smart devices are connected via external networks. If the router you’re using doesn’t have decent security protection, you could be open to cyberattacks.

    3) Circling The Employee Wagons

    Most hacking attacks are waged one of two ways, neither of which involves a high level of technical sophistication: An employee clicks on a phishing email link (a 2018 Verizon report estimates a whopping 30% of phishing emails in the U.S. are opened), or someone steals an employee’s login credentials and gets access to the company network.

    Training your employees to know what to look for is VITAL for maintaining the security of your IT systems and data. And not just with phishing schemes. Email, text and live chats with customers can also be hacked – employees should never be sharing confidential or credential info on these platforms. This kind of training isn’t a one-time thing you do with new-hires. It’s an “all the time for everyone” thing that far too few companies are actually doing.

    Ensuring employees follow protective password practices, use secure internet connections, don’t share confidential personal info online, etc., needs to extend beyond office cubical walls, too. Malware can easily be transported from an infected home computer or cell phone to your company network via flash drives, Dropbox and emails.

    Companies that once thought they could defend themselves against this cyber onslaught are now realizing that resistance is, if not futile, certainly a wager where the odds are not stacked in their favor. Which is why having reactive plans in place to manage incidents as they arise is every bit as important as proactive plans to detect and deflect intruders.

    CISO to the Rescue

    There’s a chasm within companies between the awareness of cyber threats and the readiness to address them. A recent IBM/Ponemon survey of 2,400 security and IT professionals found that 75% don’t have a formal cybersecurity incident response plan across their organization.

    The key to handling cybersecurity incidents – everything from a data breach to a stolen laptop – is having a clear communication strategy and chain of command. When an incident occurs, there’s no room for confusion about who’s in charge. Which is why Chief Information Security Officers (CISO) are possibly the hottest jobs in the C-suite today.

    Smart companies treat hacking threats like other existential risks to their business (recessions, terrorist attacks, natural disasters, etc.) and plan accordingly. Having an empowered CISO onboard is pivotal in maintaining readiness.

    You are – and will continue to be – a prime target for hackers, because you have information that’s worth its weight in Bitcoins on the black market. Given how central IT integrity and data security are in the resort casino industry, it’s hard to imagine how a company could ever be accused of investing too much in cybersecurity.

    Op/ed column submitted by Ann Nygren, President of Key Consulting Software. KCS is an IT consulting company focused on gaming and hospitality applications ranging from Agilysys (LMS/Stratton Warren/Infogenesis), Infinium (AM, AR, FA, GL, GT, HR, IR, PA, PL, PY, TR), Bally’s (CMS, CMP, ACSC & SDS), and interfaces with Aristocrat, IGT and Micros to Transitioning properties during purchase, sales, or merging of properties. KCS provides IT Departments with assistance in installation & upgrades, customization, interfacing and creation of unique client-specific software. Ann can be reached at ann@kcsoft.com.

    READ MORE IN THE SUMMER 2019 EDITION OF GAMING & LEISURE MAGAZINE.

    security
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    2025 Transformation and Change

    March 16, 2026

    Train the Mind, Tune the Machine: Designing AI for Human Self-Efficacy

    March 16, 2026

    AI Agents Are Silently Accessing Your Most Sensitive Data, and Most Companies Have No Idea

    March 16, 2026
    Leave A Reply Cancel Reply

    You must be logged in to post a comment.

    G&L VOICE

    Listen and/or watch industry influencers sharing insights in your car, office, home or while traveling. You’re going to love it!

    Sponsored by: Agilysys + ITRG
    David Ting CTO, Bespin Global

    Sponsored by: Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC4wMTYxQzVBRDI1NEVDQUZE

    David Ting CTO, Bespin Global

    March 24, 2026 12:21 pm

    Agilysys + ITRG
    Adam Lopez, President CMIT Solutions

    Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC4wNEU1MTI4NkZEMzVBN0JF

    Adam Lopez, President CMIT Solutions

    February 23, 2026 10:15 am

    Sponsored by: Agilysys + ITRG
    Mark Fancourt, Principal Consultant & Co Founder, TRAVHOTECH

    Sponsored by: Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC5CQkEwRDA0MDkwNUM2MDY1

    Mark Fancourt, Principal Consultant & Co Founder, TRAVHOTECH

    January 22, 2026 3:22 pm

    Sponsored by Agilysys + ITRG
    Benjamin Bohman, Founder & CTO of Stratishield AI

    Sponsored by Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC5GNjAwN0Y0QTFGOTVDMEMy

    Benjamin Bohman, Founder & CTO of Stratishield AI

    December 29, 2025 12:43 pm

    This episode of G&L Voice is sponsored by: Agilysys and Bepoz
    Fred Brown CTO, Virtual Procurement Services

    This episode of G&L Voice is sponsored by: Agilysys and Bepoz

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC41NTZEOThBNThFOUVGQkVB

    Fred Brown CTO, Virtual Procurement Services

    November 18, 2025 3:54 pm

    View More

    Click here to subscribe to Apple podcast.

    Gaming & Leisure
    Connect with our CEO Jeannie Caruso
    Jeannie Caruso
    Connect with the G&L Community
    • Twitter
    • Facebook
    • LinkedIn
    Copyright © 2026 Gaming & Leisure. Site managed by PixelMongers LLC.

    Type above and press Enter to search. Press Esc to cancel.

    • Sign in
    • New account

    Forgot your password?

    Lost your password? Please enter your email address. You will receive mail with link to set new password.

    Back to login

    This website uses cookies to improve your experience. By continuing to browse this site you are agreeing to our use of cookies and our privacy policy. G&L Privacy Policy
    Privacy & Cookies Policy

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT