Poor SUNY. The Twitter account of this august state academic institution was recently hacked by a porn site. And there are …
The Seventh Discipline of the Secure Business
Among the CEO’s most important responsibilities is securing her or his company against internal and external threats. Ultimate responsibility lies …
Privacy & Communications: It’s Not Just Do-or-Die
It’s an extreme worst-case scenario: In a tug-of-war between individual privacy and government oversight, privacy wins and dozens of people …
Integrating Your Business’ Technology
Are your technologies like islands in the stream of information? How well do they work together when the stream turns into a torrent? Do your legacy e-mail, CRM, and accounting systems cooperate effortlessly …
Mobile Devices & Security Policies: What You Might Not Know About The Apple / San Bernardino Terrorist Case (And How It Impacts Your Organization)
You’ve most likely heard about Apple’s response to a Feb. 16 federal ruling that requires the company to essentially hack …
Unfinished Projects: What’s a CEO to Do?
We all have the neighbor, friend, or relative who has their kitchen floor torn up, their bathroom halfway remodeled, and …
Fear of the Black Swan and Risk Assessment
If you are at the C-level in a business, you probably worry about the Black Swan event: an unforeseen catastrophe …
How to Choose the Right IT Consulting Firm
Google the term “IT consulting firm” sometime and you will get a few hits… 222 million hits to be exact. …
Weak Password Security: The Assassin’s Bullet
There is no greater threat than the assassin’s bullet. It is the slayer of kings. It cares not about your …
Why Your Firewall is Swiss Cheese
FBI director James Comey once stated that there are two types of companies: those who have been hacked by the …