The Cybersecurity Three Putt

Maybe you’re a golfer, or maybe you know someone who is. If so, then you know the passion that often accompanies the pastime. There’s often a payment of homage to the “golf gods” for putts made or pars saved. The gods themselves seem somewhat capricious, as witnessed by the tendency for golfers to follow birdies with somewhat higher scores on subsequent holes. There’s a name for that post-birdie mistake, just as there are names for almost every facet of the game. And the data is increasingly collected and considered important. And sometimes held for ransom.

The PGA Championship is the final major championship of the season, and according to a BBC report and GolfWeek Magazine, hackers penetrated servers belonging to the PGA of America in the weeks leading up to the tournament. While the timing was intended to foster a sense of urgency, the files in question never threatened the tournament itself, according to PGA officials. And a very calm Brooks Koepka held off a surging Tiger Woods among others to win the day.

Fore!

Maybe you’re not a golfer, and the metaphor above is lost on you. Look at it this way: If hackers will go after non-essential files on a golf server, is anybody really safe? How long before they recognize the fiscal possibilities of your organization and start lobbing golf balls into your backyard. Sorry. The metaphor again.

The Gimme

At ICS, we measure success by the only real scorecard, the security, and safety of our clients. Threats are now par for the course, and they combine the struggle of the sand trap with the penalty of the water hazard to slow your game. Don’t settle for that. ICS helps you tee to green on the cybersecurity links. Call today, and swing with confidence.

ISO 9001 2015Technology Industry InnovatorsVeteran Owned Small BusinessCMMI Maturity Level 3CISSP® - Certified Information Systems Security ProfessionalCertified Penetration TesterITIL IT Service ManagementCertified Ethical HackerProject Management Institute CertifiedUS Department of Homeland SecurityDisaster Recovery Institute CertifiedCertified Information Systems Auditor