tag:blogger.com,1999:blog-3547356781881548648.comments2023-07-16T00:53:21.453-07:00Integris Security InsightsJoseph Concannonhttp://www.blogger.com/profile/10254806611255067399noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-3547356781881548648.post-49581664723007558702018-09-29T11:51:25.130-07:002018-09-29T11:51:25.130-07:00InfraGard members should be contacting their NYC M...InfraGard members should be contacting their NYC Metro FBI InfraGard Coordinator. All others call the general information number at the NYC FBI Field Offices.Anonymoushttps://www.blogger.com/profile/12786367598374534144noreply@blogger.comtag:blogger.com,1999:blog-3547356781881548648.post-26465811466699189262016-10-28T04:05:48.432-07:002016-10-28T04:05:48.432-07:00The first step to finding your unique value propos...The first step to finding your unique value proposition is to identify and describe the functional jobs your customers are trying to get done. This includes tasks they are trying to complete, problems they’re trying to solve or emotional needs they’re trying to satisfy. Keep asking yourself why a customer wants to perform a certain job to get closer to understanding the real motivations that drive them.<br /><a href="http://www.redwoodvaluation.com/business-valuation-seattle/" rel="nofollow">Company appraisal Seattle</a><br />Lisa Joneshttps://www.blogger.com/profile/02147609172145692138noreply@blogger.comtag:blogger.com,1999:blog-3547356781881548648.post-83124191715069781042015-02-09T09:15:29.378-08:002015-02-09T09:15:29.378-08:00Ownership of devices and appliances, aside, the gr...Ownership of devices and appliances, aside, the greater question is, where does your expertise lie? Are you responsible for understanding what goes on "under the hood" of your infrastructure components? Historically, as technology progresses, the industry makes the technology easier to use and both available and more appealing to its consumer base. Some might call it "dumbing down" the technology; more recently, others have called it "plug and play". Practically speaking, progress tends to divorce the mechanics of a technology -- and its associated feeding and care -- from its benefits. I used to change my car's oil, myself. Now, in some newer cars, I'd be lucky to be able to FIND the filter and pan plug. In my latest car, the engine is even covered to make it look nicer, but also, I suspect, to discourage owner-made repairs. Only your dealer-based mechanic is allegedly qualified -- and often has (and can afford) the tools -- to perform the now complex maintenance and repairs. The advancements in technology demand specialization and a higher skill set. With specialization, however, comes a price: the lack of sufficient understanding of the details not only to make your own modifications and repairs but to make informed decisions. Do you not usually take your mechanic's recommendation when he or she tells you that you need to fix or replace a component? (Or, at least, do you get a second opinion and THEN act accordingly?) We find appropriate partners to trust, and then we trust their advice.<br /><br />Our IT systems and the technologies required to protect them have become sufficiently complex that security specialists are now the norm. Not just general security specialists, but professionals highly skilled in individual disciplines within the field of security and sometimes even individual technologies. We purchase products and services from security suppliers and all too often allow their in-house or third party specialists to configure these components in a one-size-fits-all fashion without the benefit of fully understanding our individual needs and customizing the implementation accordingly. Worse yet, these products and services are installed and not configured at all, leaving manufacturer supplied defaults in place.<br /><br />The result is a false sense of security. We expect that we are protected from certain types of adverse actions and conditions, while in truth, gaping holes are left in our security. Our expectations do not match reality, and we are not prepared for the unanticipated consequences.<br /><br />A fully informed understanding of our systems, the risks associated with their use, the controls placed to appropriately manage the risks, and the technologies, products, and services employed to effect, maintain, and manage these controls is essential to protecting our businesses. No sensible organization would have a third party manage their financial records and controls without having a deep understanding of the decisions made and the potential consequences of those decisions. Neither should they do so with their technology and its controls.Anonymoushttps://www.blogger.com/profile/04902524016437135726noreply@blogger.com