IT and Physical Security
A look at the 9 basic areas of a manufacturing business that can improve your company and boost your profits.
The $Profit Power$ Series Continues!
The 9 areas (with this month's topic is highlighted in red):
Marketing/Sales, Quality, Engineering, Manufacturing, Finance, Purchasing/Procurement, HR, IT and Physical Security, Facilities/Utilities/Acquisition
Information is the most valuable commodity you have. It can be destroyed by accident. Or it can be stolen, then sold or used to ruin or steal from your company. In addition, some folks hack computers for the simple joy of doing it.
The One Thing More Valuable Than Your Manufactured Product…
Be Afraid, Be Very Afraid
It happened to my company…
A number of years ago, we had a lighting strike right outside our building that burned out half of the communication ports on our PCs and dumb terminals. About $10000 worth of damage and a real pain in the butt. After that, we isolated not only the power wires with surge protectors but also the communication wires that passed the low voltage back up through the system that caused the damage.
It happened to South Carolina…
Just look at the recent hacking of the South Carolina tax department. 3.8 Million records were stolen by a foreign entity that used some sort of phishing email to penetrate the system. A simple click on a dubious email and wham, you got a problem.
It could happen to your company…
Your employees can cause the problems by having weak passwords or by taking company records home on their own computers, tablets or phone. You are just a stolen car or lost equipment event away from a mad scurry to repair the damage. I just read that an 8-digit password made up of alphabet letters, symbols and numbers can be hacked in 5 hours or less by the computers out there today. The funny thing is that most of the hacking programs start with the obvious passwords like “password” or “12345678” or “myname1” and then they start with the brute force trial and error attacks.
And YOU could actually go to jail!
Almost all companies have 1) employee social security numbers, 2) HIPAA (health information) data, 3) company proprietary information and 4) customer supplied information. All of this data must be secured either by law or by contract. Failure to secure this data can result in jail time and or large fines(for the SSN and HIPAA info) and possible loss of business in the case of the other two.
Two common mistakes…
1. Most companies believe that just because they have data that isn’t that attractive (to them) that they have little to worry about. WRONG!
2. To top it off, many companies make it all too easy to access their computers physically or do not isolate them from risk.
And three steps you can take now…
First, call me, David Senkfor, for a free
one-hour on-site*(see below) visit and consultation and I’ll give you a report card that grades your company relative to the risk you are currently exposed to. No obligation, no cost. I’ll tell you what you need to do to protect your ‘corporate memory’, your company, your money and your reputation. At no
charge to you!
Second, check my website out for what you can do today
to limit the risk and sleep better at night. Click on this link and get started now. http://tinyurl.com/cbvvqxe
Third, check out our new "Exhaust Notes" video using the link under the picture of my 1967 Chevelle to the right. In this month's video, you'll come to understand why it is essential that you implement three simple solutions that can secure your information technology and physical plant.
Please feel free to explore my website at www.topgunconsulting.com
and see how we can help you improve your efficiency and get you on the road to higher profits and greater success! Check out my blog at: http://topgunconsulting.blogspot.com/
I look forward to talking with you soon at 602-510-5998 or email me at firstname.lastname@example.org
Your Profit Driver
* This 'onsite' offer is good for companies located in Arizona.
For those outside of Arizona, special arrangements
can be made to provide a thorough review of the
IT and physical security environment through the
use of video teleconferencing and questionnaires.
All at no charge or obligation.