Cyber Security Tips for the Cannabis Industry


Tim Belvin

March 16th, 2017

Policy, Top Story


By now you have most likely heard about the security breach and hack that brought down one of the largest cannabis industry sales and inventory systems.  The hack affected all of the company’s customers and brought their businesses to a halt.  The fix was slow and arduous with customer jumping ship and looking for other options.  If you are a customer or former customer, after finding another provider, your next question is most likely “How can I prevent such an attack from happening to my business?”.

Listen to an exclusive audio interview with Tim Belvin:

The answer to that is not an easy one to answer.  There are many factors to consider when considering what it means to be “secure” in today’s complicated digital landscape that is wrought with more than millions of computer viruses, ransomware, malware, and hackers.

One thing that is simple, is the fact that you are either secure or not.  The answer is completely binary and there is no middle ground.  Many business people are willing to run with a mere sense of security rather than enduring the costs of insuring their business run in a secure manner.  In the prior sentence, “people”, is the key factor to security.  In this article, I will go through everything that one can setup to prevent hacking and loss of data, however, if the right people are not in place trained to follow policies, analyze data, or manage the many tasks necessary to be “secure”, then it is all for not.

Here are some steps you need to take to insure your business’s cyber security:

  1. Backup – Backing up your data, applications, files, etc. is one of the first and most important steps to take in safeguarding your business.  In the case that your business experiences a catastrophic event, you have must have a copy of your digital property somewhere safe.  Some businesses will trust back up services to handle their backup and then keep the data on file for 10 years plus.  There are also software escrow companies that will keep backup copies of your applications on file and ready to be turned on to take the place of your production systems should they ever become non-functional.  For other small business, backing up can be as simple as copying your files to a secondary backup drive.
  2. Use Strong Usernames and Passwords – This measure is one of the easiest things to do in safeguarding your data.  Make sure to use complicated random passwords made of at least 16 digits of random mixed alphanumeric characters, including special characters (!@#$%^&*).  Most security advice covers complicated passwords, but quite often, people will overlook making usernames complicated random strings and they will also forget about randomizing URLs as well.  If you have the ability to control the usernames you are using, instead of using “admin” or “administrator”, use a random string, like “Amfi4tRTT”.  Instead of using a URL like http://www.mywebsite.com/admin/ to access your admin area, use http://www.mywebsite.com/J12tDwHRTttt/.  The admin area may still be found, however hackers will have to take the extra steps to program their bots to look and find for your admin.  Bots that look for administration areas in “/admin/” will have a harder time finding yours.
  3. Use 2-step authentication when possible
  4. Use SSL for all point to point communication
  5. Use a firewall for all networks
  6. Keep your software up to date with security patches and configurations
  7. Protect your CPUs and Mobile devices
  8. Create policies for acceptable use of systems
  9. Limit removable media
  10. Create monitor process to enforce policies logs and analysis
  11. Only assign necessary access to users
  12. Limit machines to your network by IP Address and Mac Address whenever possible
  13. Limit communications to only necessary systems inside and outside of your network
  14. Have a disaster recovery plan
  15. Train your staff
  16. Go to cyber security learning events
  17. Designate a Cyber Security champion
  18. Report criminal activity to Law Enforcement
  19. Utilize a reverse proxy if possible to hide your real network IP addresses
  20. Run Tests to verify your security measures are working
  21. Install cameras

By keeping these tips in mind, you can ensure that your business is secure from the growing number of cyberattacks affecting the industry. Businesses may also want to consider consulting with third party security firms to double-check their systems and improve overall security.

This article was published by CFN Enterprises Inc. (OTCQB: CNFN), owner and operator of CFN Media, the industry’s leading agency and digital financial media network dedicated to the burgeoning CBD and legal cannabis industries. Call +1 (833) 420-CNFN for more information.

About Tim Belvin

Tim is a serial entrepreneur based in Seattle, WA. When Tim isn’t writing software, you can find him riding his motorcycles on the many twisty roads in the Pacific NW.


Network Partners

Follow Us on Social Media

About CFN Media Group

CFN Enterprises Inc. (OTCQB: CNFN) owns and operates CFN Media Group, the premier agency and financial media network reaching executives, entrepreneurs and consumers worldwide. Through its proprietary content creation, video library, and distribution via www.CannabisFN.com, CFN has built an extensive database of cannabis interest, assisting many of the world’s largest cannabis firms and CBD brands to build awareness and thrive. For more information, please visit www.cfnenterprisesinc.com.

Disclaimer: Matters discussed on this website contain forward-looking statements that are subject to certain risks and uncertainties that could cause actual results to differ materially from any future results, performance or achievements expressed or implied by such statements. CFN Media Group, which owns CannabisFN, is not registered with any financial or securities regulatory authority and does not provide nor claims to provide investment advice or recommendations to readers of this release. CFN Media Group, which owns CannabisFN, may from time-to-time have a position in the securities mentioned herein and will increase or decrease such positions without notice. The Information contains forward-looking statements, i.e. statements or discussions that constitute predictions, expectations, beliefs, plans, estimates, or projections as indicated by such words as "expects", "will", "anticipates", and "estimates"; therefore, you should proceed with extreme caution in relying upon such statements and conduct a full investigation of the Information and the Profiled Issuer as well as any such forward-looking statements. Any forward looking statements we make in the Information are limited to the time period in which they are made, and we do not undertake to update forward looking statements that may change at any time; The Information is presented only as a brief "snapshot" of the Profiled Issuer and should only be used, at most, and if at all, as a starting point for you to conduct a thorough investigation of the Profiled Issuer and its securities and to consult your financial, legal or other adviser(s) and avail yourself of the filings and information that may be accessed at www.sec.gov, www.pinksheets.com, www.otcmarkets.com or other electronic sources, including: (a) reviewing SEC periodic reports (Forms 10-Q and 10-K), reports of material events (Form 8-K), insider reports (Forms 3, 4, 5 and Schedule 13D); (b) reviewing Information and Disclosure Statements and unaudited financial reports filed with the Pink Sheets or www.otcmarkets.com; (c) obtaining and reviewing publicly available information contained in commonlyknown search engines such as Google; and (d) consulting investment guides at www.sec.gov and www.finra.com. You should always be cognizant that the Profiled Issuers may not be current in their reporting obligations with the SEC and OTCMarkets and/or have negative signs at www.otcmarkets.com (See section below titled "Risks Related to the Profiled Issuers, which provides additional information pertaining thereto). For making specific investment decisions, readers should seek their own advice and that of their own professional advisers. CFN Media Group, which owns CannabisFN, may be compensated for its Services in the form of cash-based and/or equity-based compensation in the companies it writes about, or a combination of the two. For full disclosure, please visit: https://www.cannabisfn.com/legal-disclaimer/. A short time after we acquire the securities of the foregoing company, we may publish the (favorable) information about the issuer referenced above advising others, including you, to purchase; and while doing so, we may sell the securities we acquired. In addition, a third-party shareholder compensating us may sell his or her shares of the issuer while we are publishing favorable information about the issuer. Except for the historical information presented herein, matters discussed in this article contain forward-looking statements that are subject to certain risks and uncertainties that could cause actual results to differ materially from any future results, performance or achievements expressed or implied by such statements. CFN Media Group, which owns CannabisFN, is not registered with any financial or securities regulatory authority, and does not provide nor claims to provide investment advice or recommendations to readers of this release. CFN Media Group, which owns CannabisFN, may from time to time have a position in the securities mentioned herein and will increase or decrease such positions without notice. For making specific investment decisions, readers should seek their own advice and that of their own professional advisers. CFN Media Group, which owns CannabisFN, may be compensated for its Services in the form of cash-based and/or equity- based compensation in the companies it writes about, or a combination of the two. For full disclosure please visit: https://www.cannabisfn.com/legal-disclaimer/.

Copyright © Accelerize Inc. · All Rights Reserved · Privacy Policy · Legal Disclaimer

loading