Dr. Jason’s Speak Life™ Newsletter – Volume 7 Issue 7
Inside This Issue
• Information Security Within Your Organization
• Message from the President
• Consulting Focus: Cloud Computing
• Industry Perspectives
Information Security Within Your Organization
Technology has been a huge asset to the business environment, but one of the drawbacks of technology is that it is susceptible to security breaches. Information security (IS) is the practice of protecting the confidentiality and integrity of computer system data from malicious attacks. It involves defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
Many organizations keep sensitive personal information about customers or employees in their files or on their network. Those individuals are trusting that their information will be kept secure. Having a sound security plan in place to collect only what you need, keep it safe, and dispose of it securely can help you meet your legal obligations to protect that sensitive data. Without an information security plan, you are setting up your organization for huge financial and customer relations losses. We have seen the impact of some recent high-profile data breaches.
Not only is there concern about protecting stakeholders’ information, organizations must also protect their own proprietary information, such as intellectual property. This information must be protected from within the organization as well as outside. Disgruntled former or current employees or vendors can be sources of problems in this area. A written policy agreed to and signed by all employees is a must. In addition, a confidentiality agreement prior to transactions where a business must disclose confidential financial information to potential buyers, lenders, financial institutions, and the like is essential.
Those with ill intentions are often a step ahead of the protections in place for new technology. Therefore, organizations must be prudent in their approach to the important area of information security. Ultimately, you need to create a culture of responsibility to ensure strong business data protection. This doesn’t just mean writing procedures for your staff to follow. It also means offering guidance and training so they understand why data protection rules matter.
Message from the President
“The hope is that we learned some things from the initially failure…”
I’m sure we all can recall a time or two in life in which we were given a second chance to get something right. It may have been a parent, coach, teacher or employer who gave us this opportunity. Even though we failed the first time, we were given an opportunity to make some modifications and try again. The hope is that we learned some things from the initial failure that would make the completion of the task doable the second time.
Life does not always offer second chances, but it is rewarding when it does. Personally, I am appreciative of these moments. Thankfully, many of us have been given more than a second chance, but multiple chances. Many people who have gone on to achieve great accomplishments in life have done so after experiencing multiple failures. The key is to not give up on your dream. Turn each failure into a teaching moment.
How are you taking advantage of your second chances today?
Consulting Focus: Cloud Computing
Cloud computing is a general term for anything that involves delivering hosted services over the Internet. The name was inspired by the cloud symbol that is often used to represent the Internet in diagrams. The goal of cloud computing is to provide easy, scalable access to computing resources and IT services. A cloud service is sold on demand, and can be public or private. A private cloud is a proprietary network or a data center that supplies hosted services to a limited number of people.
Many people believe cloud computing is the way of the future. Others have doubts, and believe it is simple the latest fad. Whatever your view, there are pros and cons to utilizing cloud computing.
Advantages:
• Cloud computing allows organizations to focus more on their business and not on managing data centers.
• New applications can be developed more quickly.
• Cloud computing is scalable.
• Cloud computing allows organizations to expand their global presence.
Disadvantages:
• There are security concerns with cloud computing.
• Data stored on the cloud may not always be accessible when needed.
• Performance on shared infrastructure can be inconsistent.
It is up to your organization to determine if cloud computing is a right fit. It remains to be seen how this technology with impact businesses and organizations in the future, but for now the trend appears to be toward using the benefits of cloud computing to increase efficiencies.
Industry Perspectives
In order for any recommendations of a consultant to have any impact, the organization must implement and maintain them. Therefore, client training is a major component of any consulting project. A large component of what consultants do is educate the client’s team members on necessary skills, knowledge and mindsets. The proper training will lead to the expected outcomes that will benefit the organization. Follow-up and progress reporting is essential to this process.
A good consultant has mastered the dynamics of interpersonal communication with clients and gaining a good rapport with them. He or she will present the right features and benefits and make them relevant and real to the client. This also involves differentiating their solutions clearly and accurately with client-matched value statements.