This is part one in a two-part series on protecting digital assets. Many computer criminals are targeting small and medium size businesses because they have more valuable assets to steal than consumers, and their security is generally much weaker than large enterprise companies. A small business represents a fat and easy victim to criminal hackers. […]
Guest Posts
Let’s be honest; let’s talk about what’s happening
Today’s cyber security landscape is littered with regulations, best-practices, arms races and ever-increasingly complex technology tools. As technologies advance, so must the controls we use to secure them. To this end, companies do the obvious; they educate people in technologies and securities, they implement the myriad tools and processes required to keep up, to keep […]
Speaking to non-IT people
As a security professional, you’re working in a field that most of us would consider highly technical. In other words, when you speak to a someone who doesn’t share your technical expertise there’s a good chance much is lost in translation. When this happens, important client relationships can be affected, processes can become cumbersome, and […]