Home
Services
Career
Job Postings
About
Innovation Management

Headquarter

445 Dexter Avenue Suite 4050 Montgomery, AL 36104

Spring 2012 Network Armor

EVALUATING AN INFORMATION SECURITY FIRM? Choosing the right information security firm is as important for your organization as choosing the right accounting firm or the right legal team… In fact, taking the time to choose wisely now can save countless resources later. Here are just a few things to consider when choosing an information security firm.

Summer 2012 Network Armor

ENSURING BUSINESS CAN CONTINUE DURING A TIME OF CRISIS A disaster can be defined as (1) an event that causes serious loss, destruction, hardship, unhappiness, or death; or (2) somebody or something that fails completely, especially in a way that is distressing [or] embarrassing. Source: Encarta Dictionary. All too often, business owners and CEO’s consider […]

Winter 2011 Network Armor

GET WELL PLAN: THE INFORMATION SECURITY RISK ASSESSMENT An Information Security Risk Assessment is a means of examining your IT infrastructure to identify vulnerable areas in the network and provide steps to secure them. Source: Encarta Dictionary. Risk assessments are crucial in validating your company’s security policy, procedures, and infrastructure. This service provides a high-level overview […]

Fall 2011 Network Armor

RESOURCES YOU DIDN’T EVEN KNOW YOU HAD As 2011 rapidly comes to a close, do you have projects that are left unfinished? Projects 1-10 have been successfully implemented, but what about that one you’ve been putting off? What about Project 11? Is there room in the budget to complete it before year-end? What about staff? […]

Summer 2011 Network Armor

IS THE AIR CONDITIONER BROKEN? NO, THE BUILDING WAS JUST ON FIRE This actually happened at ICS recently. A fire in the basement had everyone evacuated from the downtown highrise and about 7 firetrucks surrounding the building within minutes of the alarm. We immediately enacted our disaster recovery plan.

Spring 2011 Network Armor

#1 WAY TO EARN A RAISE IN 2011… You’re ready to execute on projects 1 through 10, but to really make a difference PROJECT 11 needs to be completed. You need to be able to demonstrate to your managers that you can get more accomplished in less time with the same resources. At this point, […]

Winter 2010 Network Armor

PLANNING YOUR 2011 I.T. SECURITY STRATEGY How long has it been since your organization conducted an independent security audit? Do your networks and systems meet your security and reliability benchmarks? Which industry standards have you selected as the foundation for your security program? If you haven’t formulated answers to these questions, or if you are […]

Fall 2010 Network Armor

HOW MUCH OF YOUR DATA WILL WALK OUT OF THE BUILDING TODAY? Experts estimate that up to 60% of corporate data resides on endpoint devices such as PC’s and laptops rather than on centralized, managed servers within an organization. Data leaks can occur at endpoints more easily and frequently because removable media (thumb drives/flash drives, […]

Summer 2010 Network Armor

IT SECURITY FUNDAMENTALS: INFORMATION SECURITY RISK ASSESSMENT You’ve heard the term Risk Assessment often enough. But cutting through the IT-speak, what is it exactly? What does it encompass? Consider a risk assessment like checking the doors and windows on your network. With all of the confidential corporate and customer information in your database, you would […]

Spring 2010 Network Armor

BEYOND NATURAL DISASTERS: THE INFORMATION SECURITY RISK Natural disasters such as hurricanes, tornadoes and earthquakes are only part of the risk to your business continuing to operate. There are also information security risks. These days, threats can come from anywhere. Businesses with event the most well-thought out business continuity plans must monitor and re-evaluate their plans […]