Technology Business Review – Security

by | Feb 13, 2017 | Uncategorized

Date/Time
Date – 02/22/2017
9:30 am – 10:30 am

Location
20 North Wacker – 15th Floor Gallery

Add event to your calendar
iCal

Monthly Technology Business Review Meetings – Last Wednesday of every month
────

How can we be secure without it getting in the way of your job or business? Below are some of the topics we will discuss:

  • The business side should be driving the security polices and never the IT side.
  • Security is not just about firewalls and anti-virus. Have you done a security audit with your user accounts and business applications lately?
  • Risks – Cyber insurance, Physical access, Written password and other polices, Disaster recovery plan, ….
  • Are all of your systems up to date with patching, anti-virus and spyware? And you have reports to prove it?
  • Are you emailing sensitive information?

Stop by and learn more about this month’s topic and share best practices with your building neighbors. This will be an interactive session with a business focus and the smallest amount of tech speak

 

 

 

 

John Ahlberg
CEO, Waident

CIO in the corporate world and now for Waident clients. John injects order and technology into business process to keep employees productive, enterprises running, and data safe.

Subscribe


Related posts

Interesting Tech

Interesting Tech

                      Hushme - A muzzle you wear for those important office calls that you do not want to be overheard. Or give one to that loud guy you work with to wear… KittyKorner – Turn almost any interior door into one with a cat door. The Edge Desk – Ever...

Security – Just Deal With It Already!

Security – Just Deal With It Already!

There are way too many stories about companies that discover a security breach and then find out that the actual breach happened months or even years ago. Yikes. No one ever wants to be in that position so why not try to avoid it? Krebs on Security wrote a good...

A Dark Web Story

A Dark Web Story

I have written about the Dark Web in the past, and nothing has changed, but I did want to share a real life story. Now that we have access to the Dark Web to run reports on client data breaches, we have seen interesting results. Only once did the report come back...

Subscribe to our blog!

Get our latest thinking to keep your people productive, your enterprise running, and your data safe.

Share This