Florida Restaurant & Lodging Summer 2022

Page 49

WORKFORCE/BUSINESS MATTERS

W/BM

Cybersecurity in the Internet of Things

By ANNE SALLEE

T

he world has become an “internet of things” (IoT) with network technology connecting more and more of our things to the Internet. Most devices can now connect via Wi-fi, bluetooth and/or cellular networks. If it's everywhere it must be secure. But is it? You can now live and work in a “smart” environment with smart-lighting control, smart thermostats, smart-home security, doorbell cameras and door locks. Your office can be programmed to remotely unlock, turn on, regulate temperature and more. You can speak with someone at your door from a thousand miles away and you can see what mischief your pets, children and employees are up to when you are absent — and remotely remind them they are under your watchful eye. Could this connectivity put your data at risk? Is the data transmitted through Siri, Alexa, your network, the Starbucks Wi-fi or the Starlink in your car secure? Could someone access data through your printer’s Wi-fi or get into your payment processing account through a connected device? Does your guest Wi-fi connect to the same network as the one that hosts your accounting system, your clients’ records or your proprietary information? How many data access points lead to and from your devices? With all the data access points in your network, would you know if it were compromised? Connectivity is improving with 5G, the next generation of wireless networks. Bandwidth capacity and reliability of wireless service are better. 5G is ideal for the ever-increasing data and communication requirements of the billions of connected devices that make up the IoT. Technologies like bluetooth, cellular, Wi-fi and ethernet, bring more “things” together and connect more of your devices to them. While the cost of sending and receiving data has gone down, the risk of data compromise has increased. Thanks to the connectivity of the IoT, the area of concern goes beyond the walls of your business. Is your computer screen visible to your home security camera? Do you check work emails on your cell phone when

FRL A .org

you are out? With access and connection opportunities abound, it’s a delicate balance between convenience and risk. It's on you to protect the data you manage. Cybersecurity helps protect sensitive data, personally identifiable information (PII), protected health information (PHI), intellectual property, data and governmental and industry information systems from theft, misuse and damage. Resources are available to you to assess, plan and manage the safety of your data and your network now. » Network access technology applications can control and minimize risk to IoT network connections and data. » A cybersecurity risk manager can assess your network and data infrastructure

identifying challenges, weaknesses and recommend solutions, to help you address and mitigate risk to sensitive business data and systems. » You can subscribe to a managed security as a service subscription with a third-party cybersecurity expert to monitor traffic, risks and apply fixes or changes as needed. If you don’t have the expertise, seek out the service that suits your needs and your budget before your critical data is compromised. It is less expensive to be proactive than to fix it after the fact! Anne Sallee is the Business Development Muse with RB Advisory.

FLORIDA RESTAUR ANT & LOD GING

49


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Educational Foundation ProStart students head to Nationals Teacher Training

3min
pages 60-62

Hospitality Happenings Celebrating National Tourism Week

3min
pages 57-59

A la Carte Celebrating the new, the old and updates

4min
pages 54-56

UHC Manager’s tip of the month

1min
pages 52-53

Zenith The legality of marijuana use explained

4min
pages 50-51

The Internet of Things Protect your critical data

2min
page 49

Employee Benefits Choose the right package for your business with Integrity

2min
pages 46-47

Attracting and Retaining Employees Tips on preventing turnover

2min
page 48

The 80/20 Rule Clarifications from the Department of Labor

3min
page 45

Withum The Work Opportunity Tax Credit could benefit you

2min
page 44

Adesso Claim your employee retention credit funds now

3min
page 43

Wine Tips Alfred Technologies helps to perfectly curate your list

4min
page 36

FNGA Natural gas is safe and could save you this hurricane season

1min
page 42

Michelin Recognitions FRLA Members receive recognition

1min
pages 40-41

Florida Craft Sprits Association Shake up your cocktail selection

3min
pages 38-39

Phade® Straws Ditch the plastic with WinCup's latest technology

2min
page 37

Wine Water and SeaStraw 13 Two great options for your summer drinks

0
pages 34-35

POS Systems A must-have in today’s bar industry

3min
pages 32-33

Crabby Bill’s Two long-time local establishments merge with a family focus

1min
page 24

Mystery Shopping A tool to improve the customer experience

2min
page 22

Coca-Cola The company’s magical rebranding gives a platform to creators

4min
pages 28-29

Chefs That Sizzle Executive Chef William Lawson, Mimi's Table

4min
pages 10-13

Path to Power Kobe Ichiban Japanese Steakhouse

2min
pages 8-9

The Palm Beaches Carol Roberts: A Community Pillar

3min
pages 14-16

Hard Seltzers This drink craze is here to stay

3min
pages 30-31

Leadership Reports Letters from the CEO and Board Chair

4min
pages 6-7
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.