A generic background image tangentially related to the post

How trust can impact business security

Ben Foster  |  August 14, 2017

Share: Share on FacebookTweet about this on TwitterShare on LinkedInGoogle+

It’s always hard to come to terms with the worst-case scenario, particularly when business operations are running smoothly. However, in the age of cybersecurity, organizations cannot let their guards down, even when it comes to things they trust the most.

Managers might put their faith in the technology, and in their network in particular, to provide access and operate effectively. The problem is, hardware and storage solutions can fail or be breached, and without a backup plan, it could cost you. Leaders might also place trust in the vendor, but not all providers offer the best solution to fit your business, leaving you open to serious vulnerabilities.

With the advanced methods hackers are using, believing in email senders and employees can also be big mistakes. Phishing emails are becoming more sophisticated by pretending to be a trusted source to get into your system. These actors often use familiar sounding names and will ask for personal information or to download a link containing malware. Staff members can fall for these attacks, as well as make errors through technology protocol issues and improper internet usage.

While you might want to place trust in elements of your business, it’s always necessary to keep on your toes. Learn more about the biggest how trust can impact your security and what to do about it by looking at the biggest risks in this infographic.

 

There are five things that you probably shouldn’t trust.

ISG-Graphic-July-2017-01

The following two tabs change content below.

Ben Foster

President & CEO at ISG Technology
Ben is President & CEO of both ISG Technology and Twin Valley Telephone, Inc., a fourth generation family owned company. He started his career in 1997 with Southwestern Bell/SBC where he held a variety of positions ranging from Manager of Installation/Maintenance to the Chief of Staff for the president of consumer operations. In 2004 he joined Twin Valley Telephone, Inc. where he has served as Director, Vice President and COO for the company. He has led projects, investments and acquisitions which resulted in the company tripling in size from 2005-2010. In 2011 Ben was appointed President & CEO of Twin Valley and led the acquisition of ISG Technology the same year. He has led the transformation of ISG from a regional IT reseller to a data center and IT infrastructure partner with nationwide reach. Ben is a graduate of Kansas State University in Business Administration. He has served on multiple boards including KsFiberNet, NTCA- The Broadband Association, Southwestern College and was Chairman of the Board for the Kansas Telecommunications Industry Association. He resides in Lenexa, KS with his wife and their three children.
About

Ben is President & CEO of both ISG Technology and Twin Valley Telephone, Inc., a fourth generation family owned company. He started his career in 1997 with Southwestern Bell/SBC where he held a variety of positions ranging from Manager of Installation/Maintenance to the Chief of Staff for the president of consumer operations. In 2004 he joined Twin Valley Telephone, Inc. where he has served as Director, Vice President and COO for the company. He has led projects, investments and acquisitions which resulted in the company tripling in size from 2005-2010. In 2011 Ben was appointed President & CEO of Twin Valley and led the acquisition of ISG Technology the same year. He has led the transformation of ISG from a regional IT reseller to a data center and IT infrastructure partner with nationwide reach. Ben is a graduate of Kansas State University in Business Administration. He has served on multiple boards including KsFiberNet, NTCA- The Broadband Association, Southwestern College and was Chairman of the Board for the Kansas Telecommunications Industry Association. He resides in Lenexa, KS with his wife and their three children.

Posted in Blog, Infographics, Security Tagged with:
Menu