I recently gave a talk on digital security to a group wanting to know more about protecting their business from internet security threats. What struck me was how few businesses in the room had a formal security policy in place, and how few of those have reviewed their security policy since they created it. In today’s fast-paced digital world, it is important to not only have a security policy and plan for your business, it is essential that you review it regularly. As the changes in our digital world dictate different ways of producing and storing data, criminal elements will adjust how they attempt to gain access to our data.
The advent of information technology has given rise to many astounding advancements which are seemingly limitless. The progression in technology from Texas Instruments’ famed graphing calculators to devices like the iPhone are difficult to contemplate when you realize just a few decades separated the two. However, all that good is bound to have a little bad. Security breaches large and small are commonplace, and major retail stores being hacked might make the headlines for a week.
The rapidly expanding use of technology in every aspect of business is creating a growing security concern. To protect your business and digital assets, it’s important to have a multipronged approach that addresses physical access, technology security and user policies.
Is your network in danger? What to do if there is a security breach? How to protect your company from cyber attacks?
Tony Rucci will answer these questions and share a case study about a Credit Union in Florida whose systems had many breaches despite there being no indications of any security problems. Tony has over 30 years of counterintelligence and security experience and is the founder /Root Technology whose main emphasis is secure networking,