Cyber
Security, Semper Fi
with Integrity!
by Nick Ashton CEO/CTO, CommSmart Global Group of Companies
Semper Fi
"The
motto of the U.S. Marine Corps is Semper
Fidelis, Latin for "always faithful".
Until
1871 it was "First to Fight", a
motto that still applies. Through the years, Marines have
shortened it to Semper Fi, and "Semper Fi, Mac" is the universal Marine Greeting."
shortened it to Semper Fi, and "Semper Fi, Mac" is the universal Marine Greeting."
In fact we
say Semper Fi to all platforms and
devices:
Windows
IOS
Android
Linux
|
Desktop
Laptop
Tablet
Phablet
Smartphone
|
In this cyber world when you are entrusted with other people’s information, all that is of value, including SSN#, banking and financial data, family members and their complete history, your integrity has to be and is demanded to be of the highest.
Sadly it is not!
As the daily news reports show, hacking is alive and well. Very profitable for the cyber terrorists. The victims are not so lucky! Those that have failed in preventing such
attacks have no idea why or how they were attacked until it has happened. They had not put in place proactive measures
which work in “real time” to monitor
the daily usage.
Security is an
exceptional IT discipline.
It overlaps and supports all other disciplines: computers, networks, access, storage,
apps, and data in motion. As IT evolves, so should IT security!
The failure
is in those that they believe they know it all, it worked last time, why should
it not work now? IT, from the C-level
Executive to the IT grunt is no ordinary job!
It is far different from marketing, accounting or inventory control, it
is in the NOW! It is “real
time” which demands hands on actions and a knowledgeable discipline which
must be second to none.
Cyber security is a proactive control
with loyalty and integrity beyond reproach.
We believe and take a far different
approach, we do not put the cart before the horse. In fact in reverse!
Our Cart is Cyber Analytic Red Tag.
Having
decades of experience in physical and cyber security we look at the attack
itself. Knowing what you are being hit
with and its magnitude is vital to your defense.
Proactive
preparation is the key. Collecting the
streams of requests for information, the access by whom and where it is being
sent, internal changes and all in “real time” is proactive and a must!
READ MORE!
http://www.commsmart-global.com/CART%20-%20Cyber%20Security.pdf
Email: cart@tracometry.com
Telephone: +1 (614) 655.1247
copyright 2015
No comments:
Post a Comment