Reading this morning’s edition of “Investors Business Daily” (IBD), I was drawn to the Internet & Technology section where the main article discusses Financial Services firms, now having their security fears appeased, are now moving to the cloud. The … Continue reading
Ted Lloyd
Often in conversations, I will point out that information security really is not about technology; it is about business and real life. True, we live in a digital age, and cybercrime utilizes technology simply because our real world now heavily … Continue reading
While making my way through the terminal at IAD yesterday in the early morning hours, I walked past the Delta check-in area and noticed one of the self service check-in terminals was not logged in. What attracted my interest was … Continue reading
Three Trillion Reasons – One Answer According to a recent McKinsey Report, by the year 2020, the total cost of ineffective security will reach $3 trillion dollars annually. That is a huge number and one fifth of the current US … Continue reading
I read a small blurb in PC Today on a flight this last week and they were referencing a GfK study from March 20104 which surveyed 1000 US customers.
Security frameworks generally agree that the primary activities organizations need to engage in with regards to information assets are to: Identify Assets Protect against events compromising confidentiality, integrity or availability Detect incidents Respond to actual incidents Recover … Continue reading
As Generation X and Millennials now make up a large portion of the workforce, their attitudes towards privacy have substantial impact on organization security. On a recent, short flight to Washington, DC, I was reading the US Airways magazine in … Continue reading
Make no mistake, Information Security is BIG business. Global spending in 2012 rose to around $60 billion with estimates rising to $86 billion by 2016. 1 While security spending certainly can strain any budget, even at large corporations, how are … Continue reading
Sitting down for lunch this last week with a colleague in LA, I noticed three young ladies at a table nearby. Typical of many people today, besides the constant chatter back and forth, all three were texting away and checking … Continue reading
Social Engineering … People are often the weakest link. While away on a business trip recently, I called home to my wife in the evening and she had an interesting story about her day. She was expecting a call from … Continue reading