Leadership Simplified: Doug Van Dyke

Leadership Blog

5 Critical Documents Needed for Entrepreneurs and Corporate Executives

  1. A business plan, complete with an action plan
  2. An emergency recovery plan
  3. Wills, Living Wills, and Power of Attorneys
  4. A buy/sell agreement if you have a partner(s) 
  5. An emergency briefcase. Okay, it’s not a document, but it contains copies of your important documents, databases, accounting system, and recovery plan. Importantly, in case of an emergency you can grab it, leave, go buy a laptop and be back in business within one hour.  
Posted by Doug Van Dyke on 2010-02-18 at 07:40 AM
coaching and consulting • (0) CommentsPermalink

Maintaining Safe & Stable Technology Systems

Last week I was listening to an interview with a cyber-security expert. During the interview he referenced that a variety of government security networks had been compromised in recent months and years. He then detailed some of the techniques that cyber-criminals have used. Frankly, I was expecting to hear about high-tech tools that somehow outsmarted the firewalls created by our best technologists. Surprise! One of the methods largely counted on the non-technology quality of curiosity. That’s right, it turns out that just like curiosity can kill the cat, curiosity can also kill the security network. Perhaps you are asking yourself, “How?” The answer is simple. Here is the set-up that cyber-thieves used. They downloaded a Trojan virus on a handful of thumb drives. Then, they sprinkled the thumb drives here and there in the parking lot of a national defense agency. Along came a defense employee, who was giddy at the site of a stray thumb drive. Rather than reformat the thumb drive first, they unwittingly plugged it into their computer to take a peek at the contents. The second they inserted it a nasty virus was injected into a very important computer network. Suddenly, cyber-criminals could download terabytes (that’s geek-talk for “mucho”) of data. Remarkably, the criminals could download the data remotely. In other words, they did not even have to be within 100 miles of the agency from which they stole precious secrets.

 

Keep in mind; I listened to this story via a national radio program. So let me ask you this: How safe do you keep your technology systems? Importantly, what kind of procedures do you have in place for your employees regarding screensavers, external downloads, remote informational devices, etc.? While it is a wonderful world, it can also be a scary world. Take precautions: set up logical processes and procedures and thoroughly train those curious animals out there.

Posted by Doug Van Dyke on 2010-02-17 at 05:21 AM
coaching and consulting • (0) CommentsPermalink
Page 1 of 1 pages
 
Member National Speaker's Association Providing service and insight to customers since 1997

Leadership Simplified | P.O. Box 682 | Ellenton, FL 34222 USA
1310 3rd Ave. W. | Bradenton, FL 34205
Telephone: 941.776.1121
©1997 - 2017 DVD Consulting Incorporated

Leadership Simplified. News, Ideas, Seminars, and Workshops for Management Training, Workplace Team Building, Keynote Speaker and Corporate Events