California League of Food Producers 23 ABOUT THE AUTHORS Kevin Villanueva has been in the IT field since 1997. He focuses on IT security assessments, penetration testing, HIPAA compliance audits and strategic technology plan- ning. He can be reached at (206) 302-6542 or kevin. email@example.com. Troy Hawes has over 20 years of IT experience. He oversees the firm’s ethical hacking and social engineering practice and regularly performs penetration testing and vulner- ability assessment engagements. He can be reached at (206) 302-6529 or firstname.lastname@example.org. Once these systems are in place, organizations stand to benefit from having them tested annually by an indepen- dent and qualified third party to help make sure they’re implemented properly. It takes time and commitment to provide the training and technology to protect an organization, but when done properly, it can greatly reduce the risk of a cybersecurity breach stemming from a ransomware or phishing attack. For more information on how to improve cybersecurity at your organization, contact your Moss Adams professional. Lafayette - Oakland - Fremont - San Jose - Walnut Creek californiabankofcommerce.com Banking On Your Business - Banking On You Business means a lot to us - your interests are our interests. Whether you are a food manufacturer, co-packer, processor, supplier, grower, or advisor to the Industry, you need commercial bankers, like those at California Bank of Commerce, who share the same passion and enthusiasm for your business and industry as you do. At California Bank of Commerce, our bankers are committed to investing the time to understand what makes your business unique and special. We encourage you to explore how California Bank of Commerce can make an impact on your business! ...defined by the company we keep.sm Steve Tessler Executive Vice President 510.457.3740 email@example.com We’re Not Just A Bank, We’re A Business Partner! Member FDIC It takes time and commitment to provide the training and technology to protect an organization, but when done properly, it can greatly reduce the risk of a cybersecurity breach stemming from a ransomware or phishing attack.