Close Menu
    Facebook X (Twitter) Instagram
    Community Updates
    • Quick Custom Intelligence Marks 6 Years of Transforming the Future of Casino Gaming
    • SkyCity Entertainment Group Expands Strategic Partnership with Quick Custom Intelligence
    • G2E Asia and Asian IR Expo Return This May, Driving Digital Innovation Across Gaming, Entertainment, and Integrated Resorts
    • QCI Introduces New Operational Solutions at IGA 2026
    • QCI Advances Dispatch Capabilities with Modernized, Fully Integrated Platform
    • QCI to Showcase AGI56.1 at IGA 2026, Accelerating Performance Across Tribal Gaming Operations
    • QCI Launches QCI RV, Turning Casino RV Parks into High-Value Revenue Engines
    • QCI to Showcase Agentic Platform Capabilities at IGA 2026
    Gaming & Leisure
    • Archives
      • Gaming & Leisure Magazine Archives
    • Employment Dashboard
    • Research
    • News
      • G & L Community
      • Gaming
      • Hospitality
      • Travel
      • Restaurants
    • Awards
      • Annual Gaming & Hospitality Industry Awards Entry Packet
      • G&L Platinum Award
      • G&L Transformation Award
      • G&L Partner Award
      • G&L Innovation Award
    • G&L Roundtable
      • Overview
      • Exec. Attendee Registration
      • Property Attendee Golf Only
      • Sponsor Information
      • Sponsor Registration
      • NBP Sponsor Registration
      • NBP Special Registration
      • Industry Roundtable Insights
      • Photos
      • G&L’s Health & Safety
    • G&L Forum
      • Executive Registration
      • Sponsor Registration
      • Photos
        • G&L Forum Photos
        • G&L Forum Reception Photos
        • G&L Forum Executive Document
    • About
      • About G&L Business Partners
      • G&L Business Perspectives
      • Contact Us
      • G&L Board
      • G&L Business Partners
      • G&L CEO
      • G&L Editorial Residents
      • G&L Overview Media Kit
      • G&L Privacy Notices
      • Resources
    • G&L Portals
      • Business Partner Portal
        • Submit G&L Social Post
        • Submit G&L Voice Ad
        • Submit Web Banner Ad
        • Submit G&L Magazine Ad
        • Submit For G&L Monthly
        • Submit G&L Business Package
        • Submit Your Positions Available
        • Submit Press Release
        • Submit to Calendar of Events
        • Add/Update Your Logo
        • Payments & Terms
      • Editorial Portal
        • Step 1: Please Confirm You’ll Submit for the Upcoming Edition or the New & Cool Advertorial.
        • Step 2: Submit for the Upcoming Edition
        • New Writer Onboarding
    • Calendar
    • Subscribe
    Gaming & Leisure
    You are at:Home»Article»BASIC CYBER SECURITY BEST PRACTICES

    BASIC CYBER SECURITY BEST PRACTICES

    July 10, 2024 Article Security
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cyber risk is now part of our everyday lives. It seems that high-profile breaches happen every day, and they are a grim reminder that it’s not a matter of if, but when, we are going to be the target of a cyber-attack. Cyber security is a very difficult problem to solve. The threats are constantly evolving. The adversaries are plenty: teenage hackers, social hack-activists, organized crime, and lately, nation-states with dedicated cyber warfare operations.

    Against this background, there are four basic cyber security measures that should help any organization increase their security posture. The measures are governance, prevention, monitoring and resilience.

    Governance

    Create an effective cyber security task force made up of relevant levels of management with the authority and responsibility for:

    • Defining security posture (risk assessment, security policies, evaluation of threats,mapping critical assets).
    • Defining risk appetite (the amount of risk that the organization is willing to take based on risk-level determination).
    • Defining metrics (measure progress). “If you cannot measure it, you cannot improve it.” – Lord Kelvin (1824-1907).
    • Designating communication channels, internal and external.
    • Delineating legal consequences of a breach(litigation costs, insurance costs, fines).

    Prevention

    A properly executed layered defense structure (a.k.a.Defense in Depth) of the Information Technology infrastructure (hardware/OS, applications, hosts, network components, people) should prevent a high percentage of breaches by unauthorized individuals. There are two important considerations when implementing defensive layers. First, more security layers should discourage the opportunistic hacker. They move around looking for easy targets; these hackers don’t want to invest time breaking into layers. Second, they should delay the progress of a successful attack long enough to be noticeable by the security group. These layers, at minimum, should consist of the following:

    • Perimeter protection – Boundary firewalls and internet gateways should be configured to act as a barrier to keep unwanted traffic from entering the network.
    • Network segmentation – If a breach happens, it may be easily contained inside a segment of the entire system.
    • In-bound traffic – Utilize e-mail and web traffic filtering to block spam and malware attacks.
    • Application whitelisting – Configure computers and networks to deny the execution of any non-approved application.
    • Patch management – Monitor for and install vendor patches for breaches and vulnerabilities, a majority of which are likely already addressed by the software vendors.
    • Access control policy – Should define the best access control model for local and remote access that best fits the internal functions of the organization.
    • Network Access Control – Only devices that comply with security policies are able to access network resources.
    • Physical security – Never forget about physical security; if an attacker has physical access to hardware, they own the hardware.

    Monitoring

    Probably the most important step of any security measure in place is a dedicated security group to monitor the behavior of your environment. Don’t forget Murphy’s laws, “If everything seems to be going well, you are missing something.” Any deviation from normal baselines should be investigated immediately. Some examples are unexpected server loads, an increase in the number of out-bound connections, connections lasting longer than expected, connections initiating at odd-hours, a sudden increase in the amount of data moving on exit points.

    This step requires a lot of daily work, including creating baselines, collecting and reviewing system logs, keeping up-to-date with threats to the environment, understanding proper counter-measures. The good news is that there are many products available to help automate, organize and process these huge amounts of information. There is also the option to outsource this function to outside companies that provide the necessary knowledge, with the added benefits of monitoring your environment 24×7.

    Resilience

    There is a fact that needs to be clearly understood. An Advanced Persistent Threat (APT) mounted by sophisticated attackers will eventually defeat any security measures. Usually the two most common reasons for an attack are:

    • To damage the company Information Technology infrastructure.
    • To steal company data, Intellectual Property (IP)or customer information (PII).

    For the first, a robust disaster recovery plan should help limit the extent of disruption and damage. For the latter, strong Data Loss Prevention (DLP) controls should help recognize and mitigate this risk. Either case shows that the resilience of any organization is directly proportional to the amount of work done in planning and preparing before a breach occurs.

    There is no proverbial magic silver bullet to protect us from the dangerous world of cyber threats.There is only hard work and a lot of planning to properly implement security measures. The good news is that there are resources that can guide us in this process. Two of the best are:

    • The ISO/IEC 27000, an information security management system (ISMS) standard published in October 2013 by the International Organization for Standardization (ISO).
    • The NIST Cybersecurity Framework (NIST CSF) published by the U.S. National Institute of Standards and Technology in 2014

    But one of the most valuable resources: your peers.We in the G&L Community should count on each other to ask and share best practices, insights, resources, etc. in order for our industry to improve security and stand against cyber threats.

    Marlon Ortiz is the VP of IT for American Casino and Entertainment Properties in Las Vegas, Nevada. He has twenty-four years of Information Technology experience across multiple disciplines, the last six years his primary focus has been Information Assurance and Cyber-Security. He holds a Master of Professional Studies in Information Sciences from Penn State.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    2025 Transformation and Change

    March 16, 2026

    Train the Mind, Tune the Machine: Designing AI for Human Self-Efficacy

    March 16, 2026

    AI Agents Are Silently Accessing Your Most Sensitive Data, and Most Companies Have No Idea

    March 16, 2026

    Comments are closed.

    G&L VOICE

    Listen and/or watch industry influencers sharing insights in your car, office, home or while traveling. You’re going to love it!

    Sponsored by: Agilysys + ITRG
    David Ting CTO, Bespin Global

    Sponsored by: Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC4wMTYxQzVBRDI1NEVDQUZE

    David Ting CTO, Bespin Global

    March 24, 2026 12:21 pm

    Agilysys + ITRG
    Adam Lopez, President CMIT Solutions

    Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC4wNEU1MTI4NkZEMzVBN0JF

    Adam Lopez, President CMIT Solutions

    February 23, 2026 10:15 am

    Sponsored by: Agilysys + ITRG
    Mark Fancourt, Principal Consultant & Co Founder, TRAVHOTECH

    Sponsored by: Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC5CQkEwRDA0MDkwNUM2MDY1

    Mark Fancourt, Principal Consultant & Co Founder, TRAVHOTECH

    January 22, 2026 3:22 pm

    Sponsored by Agilysys + ITRG
    Benjamin Bohman, Founder & CTO of Stratishield AI

    Sponsored by Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC5GNjAwN0Y0QTFGOTVDMEMy

    Benjamin Bohman, Founder & CTO of Stratishield AI

    December 29, 2025 12:43 pm

    This episode of G&L Voice is sponsored by: Agilysys and Bepoz
    Fred Brown CTO, Virtual Procurement Services

    This episode of G&L Voice is sponsored by: Agilysys and Bepoz

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC41NTZEOThBNThFOUVGQkVB

    Fred Brown CTO, Virtual Procurement Services

    November 18, 2025 3:54 pm

    View More

    Click here to subscribe to Apple podcast.

    Gaming & Leisure
    Connect with our CEO Jeannie Caruso
    Jeannie Caruso
    Connect with the G&L Community
    • Twitter
    • Facebook
    • LinkedIn
    Copyright © 2026 Gaming & Leisure. Site managed by PixelMongers LLC.

    Type above and press Enter to search. Press Esc to cancel.

    • Sign in
    • New account

    Forgot your password?

    Lost your password? Please enter your email address. You will receive mail with link to set new password.

    Back to login

    This website uses cookies to improve your experience. By continuing to browse this site you are agreeing to our use of cookies and our privacy policy. G&L Privacy Policy
    Privacy & Cookies Policy

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT