Page 16 - GBC Fall English 2025 flipbook
P. 16

Ginger & Cinnamon Mule
2 oz. Vodka
¼ oz. Cinnamon Syrup
Fennmans Ginger Beer
Garnish with cinnamon
Add the Vodka, and Cinnamon syrup
into a glass filled with ice and ssr.
Top with Fennmans Ginger Beer.
Top with Fennmans Ginger Beer.
Garnish with a ssck of cinnamon.
16
Golf Business Canada
“What to do if you do
become a victim of
cyber-attack? Sadly,
there are not many
options that would
make up for the loss
you will incur. “
budget for that”. Maybe, “well we
have been okay so far, we should
be okay in the future”. Those are
some of the reasons that
conversations rarely get started
between the IT person and
management. We are here to say
the cliché “If it’s not broken don’t
fix it”, does NOT apply to IT,
especially security.
The reality for most companies
is that they conduct business using
computers, and networks which is
arguably the foundation of most
companies’ communication and
operational foundation. Yet, it is
ignored, and hackers know this.
They know many companies will
avoid spending on security for the
reasons previously mentioned.
Especially small companies.
The message must come from
the top. If they are the ones that
lead by example, their team will
follow. They need to build a culture
of understanding about security
and to make sure that everyone
knows they play an important role
in protecting the club against
attack.
This is a recipe that works. We
see it in companies that understand
the risks and the importance of
their role in security. It is effective
for less cost than you may think.
BUILD A CYBERSECURITY
CULTURE
The importance of top-down
initiative is key, but helping
everyone to understand their role
in the initiative is equally
important. So often, we hear stories
about staff members being duped
into falling for a phishing scam. A
scam ends up in a ransomware
attack or in some embarrassing
situation where a staff member is
instructed to pay a bill to a vendor
or to transfer funds to some entity
believing it was their boss who
instructed them to do so only to
find out later that it was an
elaborate scam. This scam could
have easily been avoided.
It could be another situation
where the IT person has inadequate
experience or is not given the tools
they need to apply a security
protocol or application that would
prevent an unauthorized log in to
the club’s computers ending up in
data exfiltration or a fully
compromised computer network.
Another situation that is easily
avoidable.
It could be an event whereby a
staff member downloads malware
onto their “work” computer from
some random site because there are
no limitations, or stop gaps put in
place to limit the actions of the staff
workers abilities to roam free so to
speak.
There are so many situations
where a staff member who is
unaware of the dangers lurking on
the internet can inadvertently bring
down the entire network non-
recoverable. The worst part is the
boss must do the explaining to the
customers, members, shareholders
and co-owners not the staff
member.
WHAT IF YOU BECOME A VICTIM
OF CYBER ATTACK?
What to do if you do become a
victim of cyber-attack? Sadly, there
are not many options that would
make up for the loss you will incur.
Small and even mid-sized
companies rarely get support from
law enforcement due to the size of
the crime and or circumstances.
Your best defense is to inform
your customers, members, staff
and shareholders that there is an
   14   15   16   17   18