Skip to content

360 Degrees Group Inc.

Strategy and Practice for Building a Strategic Website for your Business

The good news is that, nothing is really different from what we designers have had to deal with since the beginning of the Web. In this case, the technology has just improved and made it easier for us to deal with these variations.  The first step in developing a responsive website (and one that can […]

WHAT STOPS PEOPLE FROM BUYING ONLINE?

WHAT STOPS PEOPLE FROM BUYING ONLINE? A lack of trust and face-to-face interaction prevents many people from purchasing online. It’s a known fact that consumers require a greater level of trust and confidence when buying online than face to face. When you’re dealing with an unknown shop selling products of unknown quality, trust plays a […]

TWO KINDS OF TRUST

When it comes to trust, psychologists make a distinction between two different types: cognitive and affective. Cognitive trust is knowledge-driven and, in this case, refers to your customers’ confidence in the reliability and competence of your service. When it comes to online shopping, this kind of trust stems from your customers’ previous experiences with your […]

Protection of Systems: Working with Specialist Groups

It’s critical to your success to get involved in specialist groups that monitor and inform their members of what’s important and what’s changing in the world of information security. International organizations such as the Information Systems Security Association (ISSA) and the Information Systems Audit and Control Association (ISACA) are worth getting involved in, since they […]

Prection of Systems: Working with Risk Management

Risk management sits at the heart of everything the information security team does. As such, the information security manager should encourage the business to embed information risk management into every process it uses to deliver its products and services. Every member of staff should be encouraged (and educated) to raise threats, vulnerabilities, and risks with […]

Protection of Systems – Secure Development Business Processes

Secure Development  The information security manager’s role in systems and software development is key. You will be required to ensure that the output from any development projects running in your organization (or outsourced to a third-party development company) is secure, whether they are creating a new line-of-business application or a new infrastructure capability . “But […]

Protection of Systems – What is Malware

Introducing Malware When we read about hacking in the news, we usually hear that massive corporates or government departments have been breached and some kind of corporate database has been stolen. We truly live in the age of the data breach , were hackers break into an organization’s infrastructure and purloin millions of records of […]

CREATING A SECURITY STRATEGY

The concept of a strategy is often used to describe the way the business will grow or develop over a long period of time with a number of specific targets it wants to achieve: grow by 30%, establish a 55% market dominance, expand into Europe or Australia, and so forth. Strategic targets are often pitched […]