28 SEPTEMBER 2018 • FOGHORN marinegroupbw.com | leah@marinegroupbw.com | [619] 621-2220 Marine Group Boat Works is the finest California boatbuilder and repairer of steel and aluminum high-speed ferries, catamarans and passenger vessels up to 220 feet-long. Operating two shifts, six days per week for fast turnarounds and minimized vessel time out-of-service. WHENTIMEIS OFTHEESSENCE YOU’REIN YOU’REOUT SAFETYMATTERS not as effective as a toothbrush. The same is true for managing good cyber hygiene. Without the right products and tools, personal and company in- formation you think is secure could be at risk. Reputable anti-virus/malware software from an equally reputable source, a network firewall, and password protection all help to protect data stored on your computers. For company personnel, the Transportation SecurityAdministration (TSA) recently put out a Cyber Security Awareness Guide that contains helpful information on how to maintain good cyber hygiene and what to look out for when bad actors try to access elec- tronic company files and information. The TSA guide is available from the Passenger Vessel Association (PVA). Just contact PVA staff to get a copy, or several copies. Proper Performance of Tasks Let’s take an example of a common task that most people think removes in- formation from your computer. By regularly emptying the trash can or recycle bin you remove personal or sensitive data from the hard drive. According to the folks at Norton (us. norton.com) this is unfortunately not the case. “To permanently delete files from your computer, you must use data wiping software. Whenever you introduce new software, add on hardware, or modify system files, you’re at risk of losing personal data. Get in the habit of regularly clearing out data you don’t need and make sure to wipe it clean from the hard drive.” Establish a Routine Learning to monitor cyber security regularly will greatly increase your chances of avoiding an online threat. And just like any habit you wish to make stick, it requires routine and rep- etition. The folks at Norton recommend you get started by “setting an alarm or marking a calendar with dates to address a series of tasks—things like scanning for viruses with anti-virus software, updating the operating system, checking for security patches, wiping the hard drive, and changing your passwords.” A Cyber Policy What is cyber hygiene without a policy? Here are typical areas that should be included into a cyber hygiene policy: • Passwords: Complex passwords changed regularly can prevent many malicious activities and protect cyber security. Use of passwords such as “password” and 123456 are never recommended. • Inventory Company Equipment: Know what computers, smart- phones, tablets and other devices are connected to your company network.