It’s Yesterday Once More

Employee using technologyYou are a cybersecurity warrior, a veritable scion of security. You spend many waking hours, and some sleepless nights, worrying about the health and robustness of your network and data. Are they as impenetrable as you think they are? Could you be doing more to protect them?

The answer to that last question is always yes, but we’ll get to that in a second.

 

What would you do if you had an employee using dated and doubtless unsecured technology to access and utilize your data and infrastructure? If your security detail is only as strong as the weakest link, how would you feel about employees using older model personal devices with outdated security software in the regular course of business, both on and off the clock? What if the camera and microphone on that device could be used to spy on confidential meetings and secret coffee breaks? Would you be happy?

 

We’ve Only Just Begun

Well, it turns out you do have such an employee and such a concern. As reported in Politico, our new president’s relationship with technology is less than optimal, even if his day seems filled with tweets. To send those tweets and, presumably, to make calls on your behalf, President Trump carries a dated Android with outdated security software. One can only hope that this and other security shortfalls are addressed in the near future.

 

Now about that question. Can you be doing more to protect your network and data? There’s nothing political about cybersecurity, and ICS can help you examine your network and staff for any weak links. Call today, because a vote for ICS is a vote for security.

 

Technology Industry InnovatorsVeteran Owned Small BusinessCMMI Maturity Level 3CISSP® - Certified Information Systems Security ProfessionalCertified Penetration TesterITIL IT Service ManagementCertified Ethical HackerProject Management Institute CertifiedUS Department of Homeland SecurityDisaster Recovery Institute CertifiedCertified Information Systems Auditor