2020 Q2

CANDIDATES FOR CERTIFICATION Publication of the following “Certified Division Order Analyst” applicant(s) fulfills the requirement as stated in the Voluntary Certification Policy, III C.2 which states: “…applicant’s name will be published in the NADOA Newsletter or other official publication of NADOA.” This allows the NADOA membership an opportunity to present objections to the certification of the applicant. Any objection to the certification of the applicant must be in writing and signed by a NADOA member or non-member who qualifies his knowledge and objection of the applicant. All such letters will be considered confidential and must be received by the NADOA Certification Committee at the following address within thirty (30) days following the last day of the month in which the Newsletter or other official publication of NADOA was published: NADOA Certification Committee P O Box 1656 Palm Harbor, FL 34682 If the objection warrants denial of the certification or temporary withholding of certification, the applicant will be notified by Certified Mail.

CANDIDATES FOR CERTIFICATION

Jacquelyn M Avery - Fort Worth, TX

Evelyn M Kastner – Denver, CO

CANDIDATES FOR RECERTIFICATION

Scott R Hill – Oklahoma City, OK

Cynthia Lancaster – Spring, TX

Cybersecurity and Working Remotely Over the last decade, the importance of protecting businesses from cybersecurity attacks has risen. Companies have increased budgets to protect their data, but attackers continue to try to break through our virtual walls. Due to the COVID-19 pandemic, millions of people now work from their homes. The closure of non-essential businesses and the recent “Stay at Home” order in effect for Pennsylvania has forced businesses to transition their employees to remote work. The switch to a predominantly remote workforce can pose increased risks to businesses unless they focus attention on needed cybersecurity protocols. Taking a few introductory steps can ensure a strong foundation for maintaining cybersecurity during this unprecedented time. First, businesses should provide basic guidance for staff on how to create a more secure remote work environment. A key initial step is to ask employees to look for the devices in their homes that are connected to the wireless home network and to ensure that those devices are secure and password-protected. Importantly, some of these devices – like cell

phones, gaming devices, tablets/iPads, and wireless assistants, such as Alexa, Google Home, and Siri, can be triggered to “listen” to and record conversations. This poses a business risk, if confidential discussions are inadvertently recorded. The best way to ensure these devices are not “listening” is to remove them from all office spaces. Keeping these devices updated and making sure they are all secured with unique passwords provides another layer of protection.

5

G r o w t h T h r o u g h E d u c a t i o n - A p r i l / M a y / J u n e 2 0 2 0

Made with FlippingBook - Online Brochure Maker