How to Start Your Company's Cybersecurity Program: Infographic
Published by Linda Rolf on 12/6/2021 and updated 12/16/2021
Nerdy Binge Watching
I just finished watching -- for the third and final time -- Halt and Catch Fire on Netflix. If you’re unfamiliar with this AMC series, it begins in the mid 1980’s. A nerdy team pushes their imagination and technology boundaries, ultimately creating the internet tools and technologies we rely on today.
Here are just 3 of my several takeaways after spending time with these imaginary technology builders.
It’s a reminder of the excitement and energy that comes from saying “I have an idea” and seeing the right team enthusiastically rise to the challenge.
This is fictional entertainment, but the technical landscape is real.
Many of the tools and technologies integrated into our daily lives have been evolving for more than 30 years.
How We Got Here
Let’s talk about number 3 for a minute.
Each of the significant technology advances we enjoy today was adopted slowly. There was pushback, a hesitancy to uproot the comfortable way we’ve always done things. Acceptance happened in small, often subtle, steps.
When you hit pause and revisit your journey from the mid-1980’s to now, the change is pretty astounding.
Because the way you work every day has changed so gradually, you don’t always have a clear picture of your company’s overall landscape. Think about some of the most impactful technologies you’ve adopted – email, the internet, online everything. The list is much longer than these three, but I think these three are foundational.
Because the adoption of email, the internet, online everything into your company’s operations has been so gradual, you haven’t always seen the underlying, unseen risks they have created.
Doable Cybersecurity Actions
I’m talking about security.
I know -- no one wants to talk about security because the messaging is often framed in fear. It feels like an insurance sales pitch. But the risks are real, and you should be concerned. The impacts to your company, your clients, and your employees are significant.
There is a way to get past the “it might happen someday” fear messaging. Commit to an actionable company security program that’s right for you. Now you take control.
Ready to get started?
Over the past 3 decades, the costs for technology have become an accepted line item on your company’s budget. You might grumble about the actual dollars, but you accept they are essential to your business operations and success.
We believe the tools and technologies necessary to protect your company’s valuable assets will become unquestioned line items too. These investment are as important as email, internet access, software, and hardware.
One of the challenges with security is making sense of all the pieces. Unlike buying an Office 365 subscription, for example – a single solution in a virtual box – putting the security pieces together is complicated and confusing. There are a lot of moving parts. It’s no wonder many companies give up.
In the coming weeks, we will be sharing a how-to security series for company leaders. We strongly believe that security needs to be an essential part of every company’s day-to-day operations. With the right resources to help you, a security program that is right for your company is doable.
Every company is in a different place in their security awareness and risk tolerance. Regardless of where you are today, the 16 checkboxes below are the basics every company should adopt now.
The how-to guides that are coming will explore these first 16 security steps and more in step-by-step detail. They will help you and your internal technology team navigate the complexities and implement each of these tools.
If you’re a one-person company, the white boxes are all you need to get started. As you add employees, you can add the blue boxes to your basic security action items.
Grab More of the Checklist
. . .
is a lifelong curious learner who believes a knowledge-first approach builds valuable client relationships.
She is fueled by discovering the unexpected connections among technology, data, information, people and process. For more than four decades, Linda and Quest Technology Group have been their clients' trusted advisor and strategic partner.
Linda believes that lasting value and trust are created through continuously listening, sharing knowledge freely, and delivering more than their clients even know they need.
As the CIO of their first startup client said, "The value that Quest brings to Cotton States is far greater than the software they develop."