5 minute read
Disruptor
by SCOTT CASON photography by HUWA PHOTOGRAPHY
From attacks on oil pipelines to annoying robocalls attempting to gain access to your personal information, cyberattacks are a constant threat to individual citizens, corporations, power grids, water supplies, and even national security.
Criminals and foreign states seek access to data that they can exploit, and often they succeed because proper precautions have not been taken. Poor password choices like “123456” or the all-too-frequent use of “password” often allow hackers easy victories.
It may seem like the criminals have all the advantages in this fight, but one Tiger alum believes the good guys will win, and he is on a mission to turn the tide against cyber-attacks.
Dallas Haselhorst was born in Hays. He grew up with four sisters, a brother, and a big extended western Kansas family. As early as he can remember, Dallas has been fascinated by what computers could do and how they work.
“I got pretty good at breaking and then fixing computers,” Haselhorst said.
This curiosity was first fueled by his dad, who began tinkering with personal computers back when they were still a novelty. In middle school, Dallas discovered he could download games from a version of what would ultimately become the Internet. And, using early bulletin board systems, he quickly ran up a bill of more than $400 in games.
Despite getting into trouble with his father, this experience opened his eyes to the power of what would become the worldwide web. It wasn’t until he attended Fort Hays State University that Dallas realized he could turn his fascination with computers into a job.
Dallas began his college career as a political science major. When he discovered he could turn his passion for computers into a campus job, he changed to a dual major— information networking and telecommunication and computer information systems. He still found political science fascinating, so he kept it as his minor.
“I learned a lot in my poly sci courses at FHSU that help me as an entrepreneur and small business owner today,” Haselhorst said. “The understanding of public policy and the interpersonal skills I use every day as a negotiator come from my poly sci background.”
At first glance, Haselhorst may seem an unlikely cyberwarrior. While much of the cybersecurity struggle is conducted in carefully guarded laboratories and top-secret military facilities, Haselhorst believes the path to defeating cyberattacks is through public engagement and collaboration among an ever-expanding cadre of experts in the cybersecurity community. He has an “open-source” approach that focuses on uniting the good guys and turning potential victims into the first line of defense in the battle against cyber-attacks.
In 2003, Haselhorst founded his first company, Sicoir Computer Technologies. After more than 13 years of operations, he sold the business. A gifted multi-tasker, Dallas successfully balanced time between his growing family, his work as a security engineer with Eagle Communications and later BurstIQ, and his pursuit of a master’s degree in information security technology from the SANS Technology Institute, a preeminent provider of cutting-edge cybersecurity undergraduate and graduate programs.
In December of 2016, Haselhorst launched his second company, TreeTop Security, in Hays. While his firm has the capability to help businesses of all sizes improve their cybersecurity readiness and response capabilities, TreeTop’s focus is primarily on helping small businesses that rarely have the financial resources to secure consulting partnerships with large cybersecurity firms. Business has been great for Haselhorst and his team. They currently work with many companies in a variety of industries, including the banking, healthcare, and energy sectors.
TreeTop Security is but one element in Dallas’ professional portfolio. The successful small business owner is also an accomplished non-profit entrepreneur. In 2017, he and several partners established BSidesKC (Kansas City), a non-profit organization designed to advance information security knowledge. BSidesKC is an annual open forum discussion for security engineers and their affiliates. The conference serves as a source of education, collaboration, and continued conversation for information technologists and those whose work is associated with the field.
Dallas’ involvement in BSidesKC represents his commitment to grassroots efforts that expand employment, knowledge, and participation in a field that has become the domain of big business and the wealthy. Participation in forum events is free to students of all ages.
One recent addition is a kids’ village, where younger children can gain hands-on experiences like soldering and assembling a computer network and motherboard cards — the kind of experience that first captured the interest of a young Dallas Haselhorst. It’s also an activity he is using to fuel the curiosity of the next generation of Haselhorst cyberwarriors — his four daughters. Haselhorst’s latest venture is STEM Harvest, a 501(c)(3) non-profit he established in Hays this spring that will focus on building the technology skills of school-age children in the area.
On his LinkedIn social media page, Haselhorst describes himself as a co-organizer, a researcher, and an entrepreneur. But it is the last descriptor that probably best describes him. He is a disruptor. He doesn’t accept doing things as they have always been done. He revels in pushing perceived boundaries in innovative and inclusive ways. He believes the most effective cybersecurity solutions are best created through open dialogue, open-source solution development, and collaboration among those who share his commitment to serving as a force for good in the world.
The professional consulting and outreach efforts of Haselhorst’s major professional enterprises reflect his commitment to bringing cybersecurity knowledge to those most likely to pay a heavy price when their personal data is stolen or held for ransom.
DALLAS’S 10 TIPS FOR SECURING YOUR PERSONAL DATA:
1. Back up your data.
2. Keep software current with the latest updates.
3. Create strong passwords that don’t include personal information.
4. Use two-factor authentication.
5. Don’t expose your data to unnecessary risk like using unsecured public Wi-Fi networks.
6. Recognize that all data has value to somebody who wants to exploit it.
7. Realize any device that can connect to the Internet is vulnerable.
8. Seek training that will make you an effective front-line cybersecurity warrior.
9. Trust your inner “Spidey Sense.” If something doesn’t feel right, it probably isn’t.
10. Remember, even if your data is hacked, it’s not the end of the world.