Does Your Information Security Program Depend On Gut Reactions?

information security program

“Go with your gut!” is a phrase spoken in business every day. Many executives responsible for information security programs have learned to trust their intuition and lean on it for both minor and major decisions. After all, not everything can be quantified neatly. The human factor and personal experience can never be (and should never be) completely removed from any business equation. Here’s the problem: when it comes to information security (IS) programs, businesses are too often only going with their gut. Do that, and you’re likely accepting an uncomfortable amount of risk for your organization. Here’s why. Assumptions are deadly Gut feelings are based largely on assumptions. Some … Read more

How To Understand Your Disaster Recovery Services Bill

disaster recovery services

I got my electric bill today and read the line “Total Current Charges” (which, when I think about it, is a terrible pun!). Did you ever flip the bill over to read what goes into those “current charges?” For instance, there’s the generation charge, transmission charge, carbon offset fee, energy efficiency fee, working capital fee, governments taxes and fees. There are even more factors that contribute to the bill, but that’s enough to make my point: when I pay for electricity, I’m paying for a lot more than just the kilowatts of energy necessary to light and heat my home. The same is true when it comes to disaster recovery services, but companies sometimes forget that fact. They want a back … Read more

9 Cyber Security Buzzwords And Jargon Definitions We Can All Understand

cyber security buzzwords

Hybrid cloud. BYOD. Big Data. Internet of Things. These are terms that have become part of the daily lexicon, not only within the information technology (IT) and cyber security world but also in the main stream. Jargon is integral to IT. They make complicated terms more accessible to the non-technical person, even if they aren’t easier to understand. Buzzwords are commonplace in IT security, as well, but are they truly understood? As Frank Ohlhorst writes in Tech Republic, “it seems that IT security managers are giving too much power to terms and buzzwords, letting them dictate security best practices.” Ohlhorst goes on to point out that while BYOD is just an acronym that means, simply, Brin … Read more

The Healthcare Industry Is Fighting Infectious Disease With Innovative Technology

infectious disease

If you ever watched The Jetsons as a kid, you probably were enthralled by – but also a little skeptical of – the robotic contraptions, holograms, and other crazy-seeming inventions that propelled their lives every day. You can go ahead and suspend that disbelief now, because the next time you visit the hospital, you’ll find that the world of the Jetsons is already here. Take, for instance, Gigi, the germ zapping robot that sweeps patient rooms for lingering infectious disease germs. Gigi, much like Judy from the Jetsons, is operated remotely, blasting a disinfecting ultraviolet light that offers zero chance for any transference of infectious disease. Another futuristic innovation is the Amer … Read more

Digital Transformation Delays Stall Business Growth

digital transformation

A digital transformation is underway. It is revolutionizing the way companies conduct business through every stage of a customer interaction, as well as every business unit and associated process in an organization. This digital transformation is “the realignment of, or new investment in, technology and business models to more effectively engage digital customers at every touchpoint in the customer experience lifecycle,” says the Altimeter Group. This is, of course, a broad definition that encompasses an extensive swath of organizational processes. It’s about fundamentally restructuring an organization based on new and emerging technologies – especially cloud technologies. Delays to Digita … Read more

Are You Prepared To Cope With Tougher PCI Compliance Standards?

PCI compliance

On January 1, 2015, version 3.0 of the PCI (Payment Card Industry) Data Security Standards replaced version 2.0 as the standard. In other words, what some financial institutions, merchants, and other credit card payments industry members already saw as an onerous process—complying with PCI standards and possibly being audited—is about to get even harder. While I can’t take the blood, sweat and tears out of PCI compliance, as an experienced Qualified Security Assessor (QSA) I can give you some context for why PCI is issuing a new version of its standards, and why 3.0 is a good thing for your business in the end. Why PCI 3.0? So, why is PCI issuing new standards? PCI’s self-stated mission i … Read more

The CMO (Not The CIO) Leads Digital Transformation

CIO

The concept of digital transformation is not a new one, as technology has been used to augment business functions since the dawn of the computer age. However, these days, digital transformation means different things to different companies, requiring each company to tailor their integration of technology in a way that increases productivity and improves communication with internal and external parties. Personally, I like the Altimeter Group’s definition of digital transformation, since it is the most appropriate for modern market-focused usage: “The realignment of, or new investment in, technology and business models to more effectively engage digital customers at every touch-point in the cu … Read more

Cyber Security Professionals Forecast Concerns For 2015

cyber security

As the year winds down, it is fun to look forward to the year ahead and see if we can predict what may happen over the next twelve months. At the same time, predictions can prove to be very useful for businesses that are planning budgets and spending. So every December, security experts begin to make their predictions on the future of information and network security. “While no one can totally reliably predict the future, there are often good indications in what we see that provide likely directions for the coming year,” said Geoff Webb, senior director, security strategy with NetIQ. “For example, it was pretty clear at the end of last year, after the details of the Target breach become pub … Read more