Ask Our VP of Compliance: February 2020

Clients often ask me what the top vulnerabilities are that they should be aware of.


They are expecting me to tell them about the latest Trojan and what kind of damage it does. But a Trojan or any other kind of malware is only destructive if it can get inside the network.


While we often find through penetration tests that the new clients are technically exposed due to outdated firewall firmware and outdated patches, these defects usually aren’t the direct cause of infections. The direct cause is normally a human who has not been properly trained.


Awareness training is key to any successful cybersecurity governance framework. The first training session, in my opinion, should revolve around the threats associated with emails. Specifically, all employees need to be able to spot phishing and malware attachment emails.


Management should ensure that both they and their employees:

  • Are able to spot fake sender addresses;
  • Distrust bad spelling or grammar;
  • Do not click on strange url links;
  • Are aware of tools like ‘’ to check authenticity of links (but do not use this to scan files!);
  • Never share passwords with anyone;
  • Are not afraid to ask IT to investigate a suspicious email; and
  • Are tested from time to time with phishing tests and other methods.


Malware is harmless if it cannot get inside the network. Your employees need to see themselves as gatekeepers and an integral part of the cybersecurity system.

Keith J. Barry, Esq.
VP of Compliance

Keith J. Barry joined Digital Edge in 2013. Keith possesses a BA in Computer Science, a Juris Doctor degree from Brooklyn Law School, as well as several industry certifications including AWS Cloud Architect, CompTIA Network+, and CompTIA Server+. His career has mirrored his diverse interests, and Keith has experience on the technical side as a senior systems administrator, and on the legal/business side as an attorney and cybersecurity compliance officer.

Was this article helpful?