{"id":898,"date":"2019-01-05T13:01:09","date_gmt":"2019-01-05T18:01:09","guid":{"rendered":"https:\/\/www.amp.legal\/blog\/?p=898"},"modified":"2020-05-08T10:36:58","modified_gmt":"2020-05-08T14:36:58","slug":"securing-business-tech-devices","status":"publish","type":"post","link":"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/","title":{"rendered":"Securing Business Tech Devices"},"content":{"rendered":"<p>Most companies use various types of tech\u00a0devices and systems\u00a0to run their businesses. As a result, each type of technology has its own risks of being hacked. A business can establish a culture of <a href=\"https:\/\/www.amp.legal\/blog\/business-cyber-planning-guide\/\">best practices<\/a> by using free guides offered by\u00a0online security organizations.<\/p>\n<h3>Technology Checklist<\/h3>\n<p>The <a href=\"https:\/\/staysafeonline.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">National Cyber Security Alliance<\/a> published a <a href=\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2019\/01\/Technology-Checklist.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Technology Checklist<\/a>\u00a0that provides a user-friendly guide to securing technologies. The list provides cyber strategies and security tips for different types of devices and systems. The list includes the following topics:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"192\">\n<ul>\n<li>Cloud Solutions<\/li>\n<li>Copiers<\/li>\n<li>Email<\/li>\n<li>Fax Machines<\/li>\n<li>File Sharing<\/li>\n<li>Firewalls<\/li>\n<\/ul>\n<\/td>\n<td width=\"192\">\n<ul>\n<li>Internet of Things<\/li>\n<li>Mobile Devices<\/li>\n<li>Point of sale<\/li>\n<li>Printers<\/li>\n<li>Routers<\/li>\n<li>Social networking<\/li>\n<\/ul>\n<\/td>\n<td width=\"192\">\n<ul>\n<li>Switches<\/li>\n<li>Third-party vendors<\/li>\n<li>USB<\/li>\n<li>VPN<\/li>\n<li>Website<\/li>\n<li>WiFi<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>IoT Security<\/h3>\n<p>The Internet of Things (IoT) includes <a href=\"https:\/\/aws.amazon.com\/iot\/\" target=\"_blank\" rel=\"noopener noreferrer\">billions of devices<\/a> used by organizations and households that collect, store, analyze, and share data. Inexpensive processors and wireless networks can turn anything into part of the IoT.<\/p>\n<p>The <a href=\"https:\/\/otalliance.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Online Trust Alliance (OTA)<\/a>\u00a0offers an <a href=\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2019\/01\/Enterprise-IoT-Checklist.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Enterprise Checklist<\/a> for the IoT. Below is a summary of best practices:<\/p>\n<ul>\n<li>Change device passwords<\/li>\n<li>Update firmware and software<\/li>\n<li>Enable device encryption<\/li>\n<li>Restrict automatic connections<\/li>\n<li>Turn off unneeded functions<\/li>\n<li>Verify the security of the device<\/li>\n<\/ul>\n<p>The <a href=\"https:\/\/otalliance.org\/initiatives\/cyber-incident-breach-readiness-guide\" target=\"_blank\" rel=\"noopener noreferrer\">OTA recommends<\/a> that a business should implement a comprehensive set of best practices throughout the organization to protect data. Additionally, a business should consider its data lifecycle to quickly respond to an incident. The OTA emphasizes that effectively handling a cyber breach is a \u201cshared responsibility\u201d of everyone in an organization. Importantly, the way a company reacts to a breach will have a long-term impact to its business brand, customer trust, and vendor management.<\/p>\n<p>Below are other helpful guides for securing tech devices:<\/p>\n<p>Trend Micro \u2013 <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/mobile-safety\/best-practices-securing-your-mobile-device\" target=\"_blank\" rel=\"noopener noreferrer\">Best Practices: Securing Your Mobile Device<\/a><\/p>\n<p>FDA \u2013 <a href=\"https:\/\/www.fda.gov\/downloads\/MedicalDevices\/DigitalHealth\/UCM544684.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">The FDA\u2019s Role In Medical Device Cybersecurity<\/a><\/p>\n<p>Symantec \u2013 <a href=\"https:\/\/www.symantec.com\/blogs\/threat-intelligence\/security-voice-activated-smart-speakers\" target=\"_blank\" rel=\"noopener noreferrer\">Everything You Need to Know About the Security of Voice-Activated Smart Speakers<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most companies use various types of tech\u00a0devices and systems\u00a0to run their businesses. As a result, each type of technology has its own risks of being hacked. A business can establish a culture of best practices [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":899,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[27],"tags":[112,31,13,25,79,111],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Securing Business Tech Devices - Cyber Law Blog<\/title>\n<meta name=\"description\" content=\"Most companies use various types of tech\u00a0devices and systems\u00a0to run their businesses, and each type of technology has its own risks of being hacked.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Business Tech Devices - Cyber Law Blog\" \/>\n<meta property=\"og:description\" content=\"Most companies use various types of tech\u00a0devices and systems\u00a0to run their businesses, and each type of technology has its own risks of being hacked.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Law Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-05T18:01:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-08T14:36:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2019\/01\/steampunk-devices.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/\"},\"author\":{\"name\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f\"},\"headline\":\"Securing Business Tech Devices\",\"datePublished\":\"2019-01-05T18:01:09+00:00\",\"dateModified\":\"2020-05-08T14:36:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/\"},\"wordCount\":310,\"publisher\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\"},\"keywords\":[\"best practices\",\"business\",\"cyber security\",\"data breach\",\"data privacy\",\"IoT\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/\",\"url\":\"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/\",\"name\":\"Securing Business Tech Devices - Cyber Law Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#website\"},\"datePublished\":\"2019-01-05T18:01:09+00:00\",\"dateModified\":\"2020-05-08T14:36:58+00:00\",\"description\":\"Most companies use various types of tech\u00a0devices and systems\u00a0to run their businesses, and each type of technology has its own risks of being hacked.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.amp.legal\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Business Tech Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#website\",\"url\":\"https:\/\/www.amp.legal\/blog\/\",\"name\":\"Cyber Law Blog\",\"description\":\"Exploring technology law in cyberspace\",\"publisher\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.amp.legal\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\",\"name\":\"Alice M. Porch, P.A.\",\"url\":\"https:\/\/www.amp.legal\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png\",\"contentUrl\":\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png\",\"width\":1104,\"height\":1114,\"caption\":\"Alice M. Porch, P.A.\"},\"image\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f\",\"name\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g\",\"caption\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\"},\"description\":\"Alice is a member of the Florida Bar, and she focuses on data privacy and cybersecurity compliance. She attended the Warrington College of Business at the University of Florida and earned a Bachelor of Science in Business Administration. After graduating, she earned a Juris Doctor at the Stetson University College of Law. During law school, she served as an Assistant Executive Editor for Stetson Law Review and also as a Staff Editor for Stetson Journal of Advocacy and the Law. She also served as a member of The Florida Bar Journal\/News Editorial Board from 2018-2024. She is currently a member of the Florida Bar Cybersecurity and Privacy Law Substantive Law Committee.\",\"sameAs\":[\"https:\/\/www.aliceporch.com\",\"https:\/\/www.linkedin.com\/in\/alice-m-porch\/\"],\"url\":\"https:\/\/www.amp.legal\/blog\/author\/amplegal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing Business Tech Devices - Cyber Law Blog","description":"Most companies use various types of tech\u00a0devices and systems\u00a0to run their businesses, and each type of technology has its own risks of being hacked.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/","og_locale":"en_US","og_type":"article","og_title":"Securing Business Tech Devices - Cyber Law Blog","og_description":"Most companies use various types of tech\u00a0devices and systems\u00a0to run their businesses, and each type of technology has its own risks of being hacked.","og_url":"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/","og_site_name":"Cyber Law Blog","article_published_time":"2019-01-05T18:01:09+00:00","article_modified_time":"2020-05-08T14:36:58+00:00","og_image":[{"width":900,"height":525,"url":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2019\/01\/steampunk-devices.png","type":"image\/png"}],"author":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/#article","isPartOf":{"@id":"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/"},"author":{"name":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f"},"headline":"Securing Business Tech Devices","datePublished":"2019-01-05T18:01:09+00:00","dateModified":"2020-05-08T14:36:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/"},"wordCount":310,"publisher":{"@id":"https:\/\/www.amp.legal\/blog\/#organization"},"keywords":["best practices","business","cyber security","data breach","data privacy","IoT"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/","url":"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/","name":"Securing Business Tech Devices - Cyber Law Blog","isPartOf":{"@id":"https:\/\/www.amp.legal\/blog\/#website"},"datePublished":"2019-01-05T18:01:09+00:00","dateModified":"2020-05-08T14:36:58+00:00","description":"Most companies use various types of tech\u00a0devices and systems\u00a0to run their businesses, and each type of technology has its own risks of being hacked.","breadcrumb":{"@id":"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.amp.legal\/blog\/securing-business-tech-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.amp.legal\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing Business Tech Devices"}]},{"@type":"WebSite","@id":"https:\/\/www.amp.legal\/blog\/#website","url":"https:\/\/www.amp.legal\/blog\/","name":"Cyber Law Blog","description":"Exploring technology law in cyberspace","publisher":{"@id":"https:\/\/www.amp.legal\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.amp.legal\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.amp.legal\/blog\/#organization","name":"Alice M. Porch, P.A.","url":"https:\/\/www.amp.legal\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png","contentUrl":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png","width":1104,"height":1114,"caption":"Alice M. Porch, P.A."},"image":{"@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f","name":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g","caption":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+"},"description":"Alice is a member of the Florida Bar, and she focuses on data privacy and cybersecurity compliance. She attended the Warrington College of Business at the University of Florida and earned a Bachelor of Science in Business Administration. After graduating, she earned a Juris Doctor at the Stetson University College of Law. During law school, she served as an Assistant Executive Editor for Stetson Law Review and also as a Staff Editor for Stetson Journal of Advocacy and the Law. She also served as a member of The Florida Bar Journal\/News Editorial Board from 2018-2024. She is currently a member of the Florida Bar Cybersecurity and Privacy Law Substantive Law Committee.","sameAs":["https:\/\/www.aliceporch.com","https:\/\/www.linkedin.com\/in\/alice-m-porch\/"],"url":"https:\/\/www.amp.legal\/blog\/author\/amplegal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/898"}],"collection":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/comments?post=898"}],"version-history":[{"count":9,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/898\/revisions"}],"predecessor-version":[{"id":912,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/898\/revisions\/912"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/media\/899"}],"wp:attachment":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/media?parent=898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/categories?post=898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/tags?post=898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}