{"id":23680,"date":"2022-04-20T11:05:08","date_gmt":"2022-04-20T15:05:08","guid":{"rendered":"https:\/\/avtech.com\/articles\/?p=23680"},"modified":"2022-04-20T11:05:10","modified_gmt":"2022-04-20T15:05:10","slug":"shields-up-cybersecurity-cyberattacks","status":"publish","type":"post","link":"https:\/\/avtech.com\/articles\/23680\/shields-up-cybersecurity-cyberattacks\/","title":{"rendered":"Shields Up &#8211; Cybersecurity &#038; Cyberattacks"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><a href=\"https:\/\/avtech.com\/articles\/wp-content\/uploads\/2022\/04\/For-article.png\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/avtech.com\/articles\/wp-content\/uploads\/2022\/04\/For-article.png\" alt=\"\" class=\"wp-image-23683\" width=\"167\" height=\"141\" srcset=\"https:\/\/avtech.com\/articles\/wp-content\/uploads\/2022\/04\/For-article.png 599w, https:\/\/avtech.com\/articles\/wp-content\/uploads\/2022\/04\/For-article-300x253.png 300w\" sizes=\"(max-width: 167px) 100vw, 167px\" \/><\/a><\/figure><\/div>\n\n\n\n<p><span style=\"font-weight: 400;\">Taking a<\/span><a href=\"https:\/\/www.cisa.gov\/shields-up\"> <span style=\"font-weight: 400;\">shields up<\/span><\/a><span style=\"font-weight: 400;\"> approach to<\/span><a href=\"https:\/\/avtech.com\/articles\/19502\/cybersecurity-awareness-with-room-alert\/\"> <span style=\"font-weight: 400;\">cybersecurity<\/span><\/a><span style=\"font-weight: 400;\">, as recommended by Cybersecurity &amp; Infrastructure Security Agency, has never been more important than it is right now given current events. CISA suggests that \u201cEvery organization\u2014large and small\u2014must be prepared to respond to disruptive cyber activity.\u201d With the current state of the world in mind, they are highly encouraging all organizations to prepare for, respond to and mitigate the impact of cyber-attacks. This emphasis on cybersecurity should be taken as a reminder to businesses, organizations and facilities of all kinds and sizes to reflect on the security measures they have in place. Now is the time to review whether or not you and your team have the knowledge and tools in place to prevent cyberattacks and subsequent downtime.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Effective<\/span><a href=\"https:\/\/avtech.com\/articles\/18896\/effective-business-continuity-leaves-no-ambiguity\/\"> <span style=\"font-weight: 400;\">Business Continuity<\/span><\/a><span style=\"font-weight: 400;\"> planning should address any potential weaknesses in your business operations that could lead to security breaches, ransomware attacks, phishing, attempts to exploit, human error and so on. Be extra vigilant and make sure you\u2019re protecting your customers, employees, sensitive data and assets, as well as business reputation from these kinds of unexpected downtime.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here at AVTECH, we take CISA\u2019s recommendations very seriously. For years now, we have implemented a shields up posture both internally with our own team and externally in the design of our Room Alert products and management of our customers\u2019 information. We require every one of our employees to participate in frequent cybersecurity training. We invest a considerable amount of time and money into this training because we understand that<\/span><a href=\"https:\/\/avtech.com\/articles\/23263\/10-threats-impacting-business\/\"> <span style=\"font-weight: 400;\">human error<\/span><\/a><span style=\"font-weight: 400;\"> is responsible for anywhere between 70-100% of cybersecurity incidents. Human error is preventable so our comprehensive training serves to educate our employees on how to make safe and responsible decisions. This directly benefits our customers because they are given the<\/span><a href=\"https:\/\/avtech.com\/articles\/23213\/peace-of-mind-with-room-alert\/\"> <span style=\"font-weight: 400;\">peace of mind<\/span><\/a><span style=\"font-weight: 400;\"> of knowing that their information is safe with us.<\/span><\/p>\n\n\n\n<h3><b>How Does Room Alert Practice Shields Up?<\/b><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">We also take extensive security measures to protect our Room Alert users. Room Alert environment monitoring has been keeping customer data and information private and secure since 1988. Our<\/span><a href=\"https:\/\/avtech.com\/articles\/21200\/room-alert-pro-2021-product-of-year\/\"> <span style=\"font-weight: 400;\">Room Alert PRO Line<\/span><\/a><span style=\"font-weight: 400;\"> offers advanced security, data encryption and secure connections for users who look to follow DFARS, NIST SP 800-171 and ISO\/IEC 27000 best practices. With features like 2048-bit encryption and SNMP versions 1, 2c, and 3, the Room Alert PRO Line was designed for Banking\/ Finance, Government\/ Military, Telecom and all other high-security settings where protecting data is vital to routine operations.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With our Room Alert Manager software, we are able to support the best environment monitoring hardware with the best platform for local or on-premises management of Room Alert monitors, sensors and accessories. Room Alert Manager demonstrates a shields up approach by offering options such as secure &amp; two-factor authenticated firmware updates. For example, users will need to know their login credentials in order to perform firmware updates. In Room Alert Manager, there are multi-level account user options such as viewer, manager and administrator. This is so every organization can customize who has access to what information.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Whether you are a small business or a large corporation, be proactive and take an educated shields up approach to advanced cybersecurity measures. Protect yourself from unexpected cyberattacks that could lead to costly and potentially irreversible disasters.<\/span><\/p>\n\n\n\n<h3><b>Contact Us<\/b><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">If you have any questions about cybersecurity measures with Room Alert, please contact us today through email at <\/span><a href=\"mailto:Sales@AVTECH.com\"><span style=\"font-weight: 400;\">Sales@AVTECH.com<\/span><\/a><span style=\"font-weight: 400;\">, through our online Live Chat service, or via phone at 401.628.1600.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Taking a shields up approach to cybersecurity, as recommended by Cybersecurity &amp; Infrastructure Security Agency, has never been more important than it is right now given current events. CISA suggests that \u201cEvery organization\u2014large and small\u2014must be prepared to respond to disruptive cyber activity.\u201d With the current state of the world in mind, they are highly [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0},"categories":[20],"tags":[121,128,139,266],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Taking a shields up approach, as recommended by Cybersecurity &amp; Infrastructure Security Agency, has never been more important than it is now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/avtech.com\/articles\/23680\/shields-up-cybersecurity-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shields Up - Cybersecurity &amp; Cyberattacks - AVTECH\" \/>\n<meta property=\"og:description\" content=\"Taking a shields up approach, as recommended by Cybersecurity &amp; Infrastructure Security Agency, has never been more important than it is now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/avtech.com\/articles\/23680\/shields-up-cybersecurity-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"AVTECH\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-20T15:05:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-20T15:05:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/avtech.com\/articles\/wp-content\/uploads\/2022\/04\/For-article.png\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:creator\" content=\"@AVTECHSoftware\" \/>\n<meta name=\"twitter:site\" content=\"@AVTECHSoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\">\n\t<meta name=\"twitter:data1\" content=\"Kayleigh DeDomenico\">\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data2\" content=\"2 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/avtech.com\/articles\/#website\",\"url\":\"https:\/\/avtech.com\/articles\/\",\"name\":\"AVTECH\",\"description\":\"Frequently Asked Questions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/avtech.com\/articles\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/avtech.com\/articles\/23680\/shields-up-cybersecurity-cyberattacks\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/avtech.com\/articles\/wp-content\/uploads\/2022\/04\/For-article.png\",\"width\":599,\"height\":506},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/avtech.com\/articles\/23680\/shields-up-cybersecurity-cyberattacks\/#webpage\",\"url\":\"https:\/\/avtech.com\/articles\/23680\/shields-up-cybersecurity-cyberattacks\/\",\"name\":\"Shields Up - Cybersecurity & Cyberattacks - AVTECH\",\"isPartOf\":{\"@id\":\"https:\/\/avtech.com\/articles\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/avtech.com\/articles\/23680\/shields-up-cybersecurity-cyberattacks\/#primaryimage\"},\"datePublished\":\"2022-04-20T15:05:08+00:00\",\"dateModified\":\"2022-04-20T15:05:10+00:00\",\"author\":{\"@id\":\"https:\/\/avtech.com\/articles\/#\/schema\/person\/5ea385d79227b24d52592926ce4a6bc1\"},\"description\":\"Taking a shields up approach, as recommended by Cybersecurity & Infrastructure Security Agency, has never been more important than it is now.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/avtech.com\/articles\/23680\/shields-up-cybersecurity-cyberattacks\/\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/avtech.com\/articles\/#\/schema\/person\/5ea385d79227b24d52592926ce4a6bc1\",\"name\":\"Kayleigh DeDomenico\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/avtech.com\/articles\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f48ab744a68ad31870ceb2f03b58029d?s=96&d=mm&r=g\",\"caption\":\"Kayleigh DeDomenico\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/avtech.com\/articles\/wp-json\/wp\/v2\/posts\/23680"}],"collection":[{"href":"https:\/\/avtech.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/avtech.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/avtech.com\/articles\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/avtech.com\/articles\/wp-json\/wp\/v2\/comments?post=23680"}],"version-history":[{"count":3,"href":"https:\/\/avtech.com\/articles\/wp-json\/wp\/v2\/posts\/23680\/revisions"}],"predecessor-version":[{"id":23684,"href":"https:\/\/avtech.com\/articles\/wp-json\/wp\/v2\/posts\/23680\/revisions\/23684"}],"wp:attachment":[{"href":"https:\/\/avtech.com\/articles\/wp-json\/wp\/v2\/media?parent=23680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/avtech.com\/articles\/wp-json\/wp\/v2\/categories?post=23680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/avtech.com\/articles\/wp-json\/wp\/v2\/tags?post=23680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}