Archives For managed security

san-antonio-riverwalkCPA Firms Have Some Serious Data

This morning I kicked off Allinial Global’s technology conference with a keynote on Digital Money and the growing value of data. Allinial is an association of over 8000 accounting professionals around the world. This week’s IT conference, held in San Antonio, focuses on the IT organizations that support these accounting firms.

I was encouraged to see that most of their agenda was focused on security!

While there are lot’s of IT topics worth discussing, security is by far the most pressing need. During our lunch break I heard from several attendees who reported various attempts on their companies, with hackers trying to get insiders to wire money to fraudulent accounts (CATO). This reinforces the message that corporate account takeover attacks are a real and A growing threat among small businesses.

We also discussed the need for small businesses to contract with outside security services providers to monitor traffic.  As I explain in my latest book, Digital Money, small businesses cannot afford to hire qualified security experts unless they themselves are also providing security services to their small business clients. Security people are expensive, and staying current means working on security every day.

Most IT professionals understand the need for more security, but getting management to act on assessments, and invest in proper detection/response strategies can be a challenge. Hopefully our session today has given this group a compelling message to take back to management. A message that moves them one step closer to strong detection and a timed response plan.

Check out Digital Money to find out what’s really going on out there, and why businesses are losing the battle…

© 2016, David Stelzl

 

 

Advertisements

IMG_6236Your Client’s Data Value Demands a Response

Last week I spoke at the Oklahoma Technology Symposium at The Cox Convention Center downtown, and then again to business leaders at the Gailaria Country Club north of the city. (Thanks to AnchorPoint Security and Check Point Software.)

The value of your client’s data is rapidly growing, and this was central to both of my presentations.

The Proof is in the Ransomware

People are paying the ransom. They can’t afford not to. Just this morning the WSJ reported another incident, this one related to the Leavine family NASCAR race team. They only paid $500, but $500 for what? The true cost of a breach like this is much greater. The FBI estimates the total cost per incident to be around $333,000! And the incidents of ransomware now four times what they were last year.

If you’re not talking to your clients about ransomware, now is the time. But more than talk is needed. They need answers.

Start by assessing their exposure to this type of attack. Can your client detect it coming in with their current security set up? My guess is that most can’t. That’s a managed services offering right there. Few companies will have the expertise to do this internally. They also need user awareness training. One place to start might be my latest book, Digital Money. It will be out by the end of this month!

The fact is, more data is being created, and just about every business is down when their computers are down. Data defines just about everything, including all of their clients, R&D, projects, finances, etc. Without their data, they’re out of business. What’s that worth?

blockchainBlock Chains, Cyber Currencies, and The Value of Data

Digital Money, my next book, should be out this summer!

If you’ve read Data@Risk, this is the update…for the past seven years resellers have used Data@Risk as a tool to educate business leaders (prospects and clients) on security, moving them to change their strategy. That was 2009.

It’s time for an update….

Money is going digital, but data is even more valuable. Disaster Recovery experts used to say, “People are a company’s most important asset.” While I agree – it’s also true that businesses act as if data is their most important asset. People can leave in mass, and even go on strike, and the company will likely recover. Lose your data, and the bankruptcy rate is high. Especially in the SMB markets.

This book explores security, including:

  • 7 Things your clients need to know about if they want their data to be safe. (Trends they don’t understand – but will be shocked to learn about.)
  • The one mistake every company seems to be making – one that is leading to failure after failure…and what to do about it.
  • Why just about every company must have a managed security program – no matter how small they are, and how to convince them to use yours.
  • Seven mindsets business leaders must adopt, and reinforce in their team members – if they plan to stay in business.
  • What to look for in an IT Services Provider, and why they can’t groom their own internal security experts (unless they are Fortune 500 or bigger). – a perfect introduction to your services! 

Stay tuned!  I’m in the final editing stages, and about to send it off for official editing…

PS. While you’re waiting, check out the Security Sales Mastery Training Program!  It’s online and chances are I can get you a sponsored seat (if you’re a reseller working with one of the major technology distributors!) <<< Click and we’ll get funding for you!

marriottThe Security Opportunity In Chicago

Last night, thanks to Check Point and Tech Data for their sponsorship,  I presented some of the most important information for a reseller’s future success…adding security to the MSP program.

The response was clear – MSP business is a commodity, if you don’t have something more than, cost reduction or greater efficiency as your value proposition. I spoke with one sales manager after the program – his company is fairly new in security, but their initial reaction from their customers and prospects makes it clear that this move is necessary. If you want to grow your business, start with security – everyone needs it, it’s urgent, and it creates a long term value proposition as you move your clients to manage their risk.$1 HC Book Ad

Check Point followed my presentation with a compelling message – the need to add the detection elements at the perimeter, but also on all end-nodes; especially tablets and phones.  David Wheeler,  the local SE for Check Point, demonstrated a simple hack on his phone, which then recorded everything he said for the next five minutes. There was no indication the phone had been hacked. In fact, the screen was dark – it was just sitting on the podium. He then launched an app from his laptop which replayed his comments. Not only that, it gave us all kinds of information gathered from the phone including personal details you would not want broadcasted to the world! What if this were a financial review meeting or strategy session in one of your client’s conference rooms?

Several people left with plans to get more involved in security – a great first step would be setting up your next lunch & learn to educate your clients and prospects on these trends. My book, The House & The Cloud provides the talk-tracks you need to take your client through the Impact vs. Likelihood risk discussion, The House & Cloud message to show them they are at risk, and an assessment process (on page 194) that will build the undeniable justification you need to move forward into remediation projects, product sales, and longterm managed security contracts.

© 2015, David Stelzl