Category Archives: Business Process

Are You Integrating Security into Your Celebration of #CXDay?

Is the first Tuesday of October marked as a special date on your calendar? If not, the significance around social channels will alert you to this hashtag. The second Tuesday in October is #CXDay, and according to Annette Franz (@CXJourney … Continue reading

Posted in Business Process, Data Breach, Data Security | Tagged , , , | Leave a comment

Is Your Business Ready for the Cloud?

These days, wherever you go, there’s always someone extolling the virtues of cloud computing. How often has someone at your monthly C-Suite meeting said, “Cloud computing is the answer to XYZ?” But then the conversation takes an unintended turn, and … Continue reading

Posted in Business Process, Cloud Computing, Data Security, Network Security, Telecommuting | 1 Comment

Does Your Business Conduct Regular Security Audits? Here Are 3 Tips

Thanks to the numerous security breaches in the news, the C-suite members of your business should be thinking about regular security audits. While size does matter, the more employees you have and the more data you generate, security audits are … Continue reading

Posted in Business Process, Data Security, Management and Technology, Network Security | Tagged , , | Leave a comment

Address Books, Webmail and the Cloud

To All businesses Who Use Address Books on Webmail: stop and learn why your data may be at risk. Instead of Webmail, use a third-party email client such as Outlook or Thunderbird. Recently, I was hacked. No one is immune … Continue reading

Posted in Business Process, Cloud Computing, Data Security, Disaster Recovery, Email | Tagged , , , , | Leave a comment

Does Your Business Fail the Customer Privacy Test?

I had a recent experience where my privacy was compromised, and based on the inaction by the company, I wonder how many experiences I encounter that are not as obvious. I visited a local branch of a national financial institution … Continue reading

Posted in Business Process, Data Security, Online Security | Tagged , , , | Leave a comment

5 Ways to Prepare for Data Breaches – Before It’s Too Late

I read a recent post that has stuck with me. The question raised was how do businesses, especially midsize businesses, budget for insider threats: “Midsize firms simply cannot afford data breaches, no matter what the cause. [But] a company that … Continue reading

Posted in Business Process, BYOD, Data Security, Disaster Recovery, Management and Technology, Network Security, Social Media | Tagged , , , | 1 Comment

Want a Competitive Advantage? Then Protect Your Customers’ Privacy

It seems as if we hear about a major data breach every day, whether it’s a government entity, hospital or other medical institution, or a large retail outlet. Whether the breach occurs due to malware or a lack of external … Continue reading

Posted in Business Process, Data Security, Online Privacy, Privacy Rights | Tagged , , , | Leave a comment

Backup Day is Every Day – Not Just Once a Year

You may have heard the recent buzz in the tech world: “Don’t Be an April Fool. Be Prepared. Back up your files on March 31.” According to Backblaze, 30% of people have never backed up their systems. That’s a staggering … Continue reading

Posted in Business Process, Data Security, Disaster Recovery, Management and Technology, Network Security, Tech Equipment | Tagged , , | Leave a comment

Could Your Business Survive If Everyone Telecommuted?

While iPods and smartphones revolutionized the music and cell phone industries, could telecommuting totally revolutionize the workplace? This is a very interesting concept, but certainly, your industry will determine if this is possible. While some companies have stopped offering telecommuting … Continue reading

Posted in Business Process, BYOD, Cybersecurity, Data Security, Mobile Computing, Network Security, Online Security, Tech Equipment, Telecommuting | Tagged , | Leave a comment

The Newest Event at the Olympics: Electronics Hacking

If you own a business, you should be very worried for the next couple of weeks. You may not be making any large purchases, hiring entire departments of personnel, or launching new products, but your data may be at risk … Continue reading

Posted in Business Process, BYOD, Cybersecurity, Data Security, Management and Technology, Network Security, Online Privacy, Online Security, Tech Equipment | Tagged , , | Leave a comment