C-Suite and Techies: 6 Concepts for Understanding Source of Threats

When designing security it is important to understand what you are attempting to protect as well as what you are protecting against. What you are protecting are your assets and business processes. An asset is anything used in a business task. Without assets your organization could not function and would not exist. Your business processes are the activities performed to accomplish your mission or goals as well as providing products or services to your customers. What you are protecting against are the threats that could harm your assets or interrupt your business tasks.

Read more

C-Suite and Techies: Minimizing End User Errors

Security is an essential business responsibility. For the typical organization, at least half of the violations of the security policy are from internal personnel. While most of those violations are mistakes or errors caused by ignorance, some are performed intentionally and maliciously, against the company, other employees — or even customers. For a top executive, reducing these violations is crucial to maintaining a growing business. For an IT manager and/or security manager, reducing these violations is important to prevent downtime and improve efficiency. Fortunately, there are many steps that can be taken to help reduce end-user security violations. Most of these solutions are a combination of technology and training. And they are designed to address specific situations. These ideas might not address every issue occurring in your organization, but you are likely dealing with a majority of these concerns.

Read more

C-Suite and Techies: Some Essential Security Tools

Not every executive is aware of all the essential security tools that every organization needs. This blog post is intended to be a quick primer for those executives, and it also serves as a talking points memo for IT security officers who need to communicate the key security elements.

Read more