Category: Leadership

  • Understanding Identity and Access Management (IAM)

    Identity and Access Management (IAM) is crucial for controlling access to sensitive information, ensuring security, compliance, and efficiency. It centralizes user identities and access rights, streamlining their management and enforcing precise access controls. IAM verifies user identities, manages access, supports productivity, reduces data breach risks, and simplifies compliance with regulations.

  • Who should be responsible for cybersecurity?

    Clearly, cybersecurity is everybody’s problem. It’s high time this truth was recognized, starting with the executive suite on down.   The news today is flush with salacious stories of cyber-security breaches, data held hostage in brazen ransomware attacks, and compromised records and consumer information. So too has the fallout become increasingly familiar: broken trust, ruined…

  • How to get your staff to take cybersecurity seriously

    Common sense only goes so far and you need to make sure that best practices around security don’t go in one ear and out the other. Here’s your attack plan. When it comes to cybersecurity, software company AutoClerk makes sure that its 25 employees know they are on the front lines of something akin to…

  • Cybersecurity ROI: Still a tough sell

    Panelists at the MIT Sloan CIO Symposium agree that selling top management on the value of “something that doesn’t happen” is tricky. How do you convince a company board of directors that there is a return on investment (ROI) for something that doesn’t happen? Read here…

  • A lot of businesses you see are veteran-owned (including ours), they just don’t advertise it very often.  It may be because of the negative connotations it once carried in previous eras or some other reason altogether, but they should display it loud and proud for reasons I will explain here. Veterans start and operate businesses…