Accessibility Statement Skip Navigation
  • Why PRWeb
  • How It Works
  • Who Uses It
  • Pricing
  • Login
  • GDPR
  • Create a Free Account
Return to PRWeb homepage
  • News
  • Resources
  • Contact
When typing in this field, a list of search results will appear and be automatically updated as you type.

Searching for your content...

No results found. Please change your search terms and try again.
  • News in Focus
      • Browse News Releases

      • All News Releases
      • Multimedia Gallery

      • All Multimedia
      • All Photos
      • All Videos
  • Business & Money
      • Auto & Transportation

      • Aerospace, Defense
      • Air Freight
      • Airlines & Aviation
      • Automotive
      • Maritime & Shipbuilding
      • Railroads and Intermodal Transportation
      • Supply Chain/Logistics
      • Transportation, Trucking & Railroad
      • Travel
      • Trucking and Road Transportation
      • View All Auto & Transportation

      • Business Technology

      • Blockchain
      • Broadcast Tech
      • Computer & Electronics
      • Computer Hardware
      • Computer Software
      • Data Analytics
      • Electronic Commerce
      • Electronic Components
      • Electronic Design Automation
      • Financial Technology
      • High Tech Security
      • Internet Technology
      • Nanotechnology
      • Networks
      • Peripherals
      • Semiconductors
      • View All Business Technology

      • Entertain­ment & Media

      • Advertising
      • Art
      • Books
      • Entertainment
      • Film and Motion Picture
      • Magazines
      • Music
      • Publishing & Information Services
      • Radio & Podcast
      • Television
      • View All Entertain­ment & Media

      • Financial Services & Investing

      • Accounting News & Issues
      • Acquisitions, Mergers and Takeovers
      • Banking & Financial Services
      • Bankruptcy
      • Bond & Stock Ratings
      • Conference Call Announcements
      • Contracts
      • Cryptocurrency
      • Dividends
      • Earnings
      • Earnings Forecasts & Projections
      • Financing Agreements
      • Insurance
      • Investments Opinions
      • Joint Ventures
      • Mutual Funds
      • Private Placement
      • Real Estate
      • Restructuring & Recapitalization
      • Sales Reports
      • Shareholder Activism
      • Shareholder Meetings
      • Stock Offering
      • Stock Split
      • Venture Capital
      • View All Financial Services & Investing

      • General Business

      • Awards
      • Commercial Real Estate
      • Corporate Expansion
      • Earnings
      • Environmental, Social and Governance (ESG)
      • Human Resource & Workforce Management
      • Licensing
      • New Products & Services
      • Obituaries
      • Outsourcing Businesses
      • Overseas Real Estate (non-US)
      • Personnel Announcements
      • Real Estate Transactions
      • Residential Real Estate
      • Small Business Services
      • Socially Responsible Investing
      • Surveys, Polls and Research
      • Trade Show News
      • View All General Business

  • Science & Tech
      • Consumer Technology

      • Artificial Intelligence
      • Blockchain
      • Cloud Computing/Internet of Things
      • Computer Electronics
      • Computer Hardware
      • Computer Software
      • Consumer Electronics
      • Cryptocurrency
      • Data Analytics
      • Electronic Commerce
      • Electronic Gaming
      • Financial Technology
      • Mobile Entertainment
      • Multimedia & Internet
      • Peripherals
      • Social Media
      • STEM (Science, Tech, Engineering, Math)
      • Supply Chain/Logistics
      • Wireless Communications
      • View All Consumer Technology

      • Energy & Natural Resources

      • Alternative Energies
      • Chemical
      • Electrical Utilities
      • Gas
      • General Manufacturing
      • Mining
      • Mining & Metals
      • Oil & Energy
      • Oil and Gas Discoveries
      • Utilities
      • Water Utilities
      • View All Energy & Natural Resources

      • Environ­ment

      • Conservation & Recycling
      • Environmental Issues
      • Environmental Policy
      • Environmental Products & Services
      • Green Technology
      • Natural Disasters
      • View All Environ­ment

      • Heavy Industry & Manufacturing

      • Aerospace & Defense
      • Agriculture
      • Chemical
      • Construction & Building
      • General Manufacturing
      • HVAC (Heating, Ventilation and Air-Conditioning)
      • Machinery
      • Machine Tools, Metalworking and Metallurgy
      • Mining
      • Mining & Metals
      • Paper, Forest Products & Containers
      • Precious Metals
      • Textiles
      • Tobacco
      • View All Heavy Industry & Manufacturing

      • Telecomm­unications

      • Carriers and Services
      • Mobile Entertainment
      • Networks
      • Peripherals
      • Telecommunications Equipment
      • Telecommunications Industry
      • VoIP (Voice over Internet Protocol)
      • Wireless Communications
      • View All Telecomm­unications

  • Lifestyle & Health
      • Consumer Products & Retail

      • Animals & Pets
      • Beers, Wines and Spirits
      • Beverages
      • Bridal Services
      • Cannabis
      • Cosmetics and Personal Care
      • Fashion
      • Food & Beverages
      • Furniture and Furnishings
      • Home Improvement
      • Household, Consumer & Cosmetics
      • Household Products
      • Jewelry
      • Non-Alcoholic Beverages
      • Office Products
      • Organic Food
      • Product Recalls
      • Restaurants
      • Retail
      • Supermarkets
      • Toys
      • View All Consumer Products & Retail

      • Entertain­ment & Media

      • Advertising
      • Art
      • Books
      • Entertainment
      • Film and Motion Picture
      • Magazines
      • Music
      • Publishing & Information Services
      • Radio & Podcast
      • Television
      • View All Entertain­ment & Media

      • Health

      • Biometrics
      • Biotechnology
      • Clinical Trials & Medical Discoveries
      • Dentistry
      • FDA Approval
      • Fitness/Wellness
      • Health Care & Hospitals
      • Health Insurance
      • Infection Control
      • International Medical Approval
      • Medical Equipment
      • Medical Pharmaceuticals
      • Mental Health
      • Pharmaceuticals
      • Supplementary Medicine
      • View All Health

      • Sports

      • General Sports
      • Outdoors, Camping & Hiking
      • Sporting Events
      • Sports Equipment & Accessories
      • View All Sports

      • Travel

      • Amusement Parks and Tourist Attractions
      • Gambling & Casinos
      • Hotels and Resorts
      • Leisure & Tourism
      • Outdoors, Camping & Hiking
      • Passenger Aviation
      • Travel Industry
      • View All Travel

  • Policy & Public Interest
      • Policy & Public Interest

      • Advocacy Group Opinion
      • Animal Welfare
      • Congressional & Presidential Campaigns
      • Corporate Social Responsibility
      • Domestic Policy
      • Economic News, Trends, Analysis
      • Education
      • Environmental
      • European Government
      • FDA Approval
      • Federal and State Legislation
      • Federal Executive Branch & Agency
      • Foreign Policy & International Affairs
      • Homeland Security
      • Labor & Union
      • Legal Issues
      • Natural Disasters
      • Not For Profit
      • Patent Law
      • Public Safety
      • Trade Policy
      • U.S. State Policy
      • View All Policy & Public Interest

  • People & Culture
      • People & Culture

      • Aboriginal, First Nations & Native American
      • African American
      • Asian American
      • Children
      • Diversity, Equity & Inclusion
      • Hispanic
      • Lesbian, Gay & Bisexual
      • Men's Interest
      • People with Disabilities
      • Religion
      • Senior Citizens
      • Veterans
      • Women
      • View All People & Culture

  • Hamburger menu
  • Cision PRWeb provides efficient communication tools to continuously engage with target audiences across multiple online channels
  • Create a Free Account
    • ALL CONTACT INFO
    • Contact Us


      11AM ET Sunday – 8PM ET Friday

  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR
  • News in Focus
    • Browse All News
    • Multimedia Gallery
  • Business & Money
    • Auto & Transportation
    • Business Technology
    • Entertain­ment & Media
    • Financial Services & Investing
    • General Business
  • Science & Tech
    • Consumer Technology
    • Energy & Natural Resources
    • Environ­ment
    • Heavy Industry & Manufacturing
    • Telecomm­unications
  • Lifestyle & Health
    • Consumer Products & Retail
    • Entertain­ment & Media
    • Health
    • Sports
    • Travel
  • Policy & Public Interest
  • People & Culture
    • People & Culture
  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR
  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR
  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR

Apply These 6 Critical Actions Before Hackers Attack
  • USA - English


News provided by

Suzi Neft Promotes

Apr 22, 2014, 08:00 ET

Share this article

Share toX

Share this article

Share toX


Pittsburgh, PA (PRWEB) April 22, 2014 -- Computer security breaches are unseen. It can’t be touched, felt or tasted, but when it rears its ugly head it can destroy a company’s reputation, personnel files, credit card information and more. Albert E. Whale, President and Chief Security Officer of IT Security, Inc. of Pittsburgh discusses six reasons companies should be proactive about Intern et Security.

"Taking a proactive approach to Internet Security, before the breach will pay off 100 fold for your business," says President and Chief Security Officer Albert E. Whale.

Post this

1.) First, be PROACTIVE rather than REACTIVE when it comes to IT security. This will pay off 100 fold for your business. Today, companies large and small are targeted from banks, utilities, health care institutions, manufacturing, service providers, Social Networks and government are attacked for financial, political reasons, and also just to cause problems. Breaches come from both inside and outside the U.S. Customers of hacked companies often find the security breaches, such as credit card holders who find fraudulent charges on their bankcard accounts, or fraudulent information on their Credit reports. By then, it’s too late. Mr. Whale says, “IT Security, Inc. sets up systems to help guard against a security breach. When companies come to IT Security with a security breach, they weren’t doing enough to keep their systems secure. We also help to mitigate systems after a breach occurs, as well as preventing them from occurring in the first place. The choice is yours, systems can be saved, but at a higher cost in time, money, and reputation.”

2.) Build security into your system from the start. “The current security posture of any organization must be to build security into the networks, programs and systems from the start, so that will help to stave off security breaches,” says Mr. Whale. “The days of trusting the security to a front end Firewall or proxy are long over. IT Security will evaluate your security posture and move you forward.”

3.) Discuss with your bosses how hacking happens, and once it happens don’t keep it a secret and continually worry about your job while doing your best IT work. Keep a continuous dialogue going so there are no secrets. We’ve all heard about Target stores, its long security breach, and the volume of compromised customer information. The IT department, according to Reuters (Frankel, Jim and Heavey, Susan. 2014. “Target Says It Declined To Act On Early Alert of Cyber Breach.” Reuters Web Site. Retrieved April 14, 2014. (http://www.reuters.com/article/2014/03/13/us-target-breach-idUSBREA2C14F20140313), Target’s security service “labeled the threat with the generic name malware.binary. Target’s two security experts “typically don’t get excited about such generic alerts because (their security service) does not provide much information about those threats… Target's security team received hundreds of such alerts on a daily basis, which would have made it tough to have singled out that threat as being particularly malicious.” This is a case in point for continually auditing and reviewing the effectiveness of anti-hacking software. Often people who work in corporate IT departments do not let their superiors know they’ve been hacked because the staff doesn’t know how to fix the problem, heads may roll, or management will not understand the cost of solving the problem.

4.) Audit your computer system regularly. “All networks need to be audited and reviewed to determine their continuing effectiveness every six months, and the applications used in the environment every year,” Says, Mr. Whale. “These scans vary depending on the kinds of systems the company has and the needs of that company. ‘You don’t know what you don’t know unless you are being proactive.’ Get an idea of what attackers are doing today before they get into your company’s system.” Ideally, have an outside IT security service audit the system to make certain you haven’t overlooked a breach in a system with which you work every day. Mr. Whale says, “Several clients have told me that they don’t have time for me to perform an audit for them, and they wind up calling me back after they are hacked, spending 100 time more money and time after the fact. Start today rather than waiting – tomorrow is too late.”

Jim Lynn of All Access Hosting, calls on IT Security, Inc. for problems he encounters and cannot handle himself. “IT Security, Inc. is the big guns. Albert Whale is completely honest,” relates Mr. Lynn. “He tells me exactly what’s wrong and what it will take to fix it. He has rescued my clients and I from potential ruin. Confidentiality is of the utmost importance for me and for Albert and that’s essential. IT Security’s work is impeccable, always correct and up to date. Investing with IT Security has been well worth my time and money.”

5.) Determine rules for what type of web sites can be used on company computers. This may make your co-workers grumble, but it will help to keep computer systems safe from hackers. “People within a company who browse the Internet while at work invite malware into the computer system that isn’t supposed to be there,” relates Mr. Whale. “This malware can explore the company’s entire computer system gathering and exploring sensitive files and being hostile to the entire system before the IT department grabs a handle on it.” Determine what types of sites are necessary to the operation of the company and, after approval of management, tell your co-workers to leave the Internet browsing at home.

6.) Hackers never take a holiday! Certainly, we all take vacations and on major holidays you can roll a bowling ball on any downtown street in a major city and not ding a car. But, there are so many hackers out there holidays are devoid of meaning. Time and space mean nothing to the hoards of hackers. They want to be noticed, grab billions and they do. So beware and be proactive at all times.

“Ideally, all our systems need to be resistant to attacks.” Mr. Whale and IT Security, Inc. has quite a diverse background in mitigating strategy and application development creating specialized tools and IPS (Intrusion Prevention System) software for application security. “The point is to be proactive rather than reactive. Do everything you can to protect your business and customers from inside and outside the borders of your business.”

For more information, contact Suzi Neft Promotes, LLC at 412-721-4320 or IT Security, Inc. at http://www.IT-Security-inc.com.

Suzi Neft, Suzi Neft Promotes, http://www.suzineftpromotes.com, +1 (412) 721-4320, [email protected]

Modal title

Contact PRWeb

  • 11AM ET Sunday – 8PM ET Friday
  • Contact Us

About PRWeb

  • About PRWeb
  • Partners
  • Partnership Programs
  • Editorial Guidelines
  • Resources

Why PRWeb

  • Why PRWeb
  • How It Works
  • Who Uses It
  • Pricing

Accounts

  • Create a Free Account
  • Log in
  • Contact Us

Do not sell or share my personal information:

  • Submit via [email protected] 
  • Call Privacy toll-free: 877-297-8921

Contact Cision

Products

About

My Services
  • All News Releases
  • Online Member Center
  • ProfNet
Cision Distribution Helpline
888-776-0942
  • Legal
  • Site Map
  • RSS
  • Cookie Settings
Copyright © 2025 Cision US Inc.