Influence Authority – Soft Tactics Vs. Hard Tactics

When it comes to wielding influence from a position of authority, the strategies people use tend to fall into one of two main categories: soft tactics and hard tactics.  Soft tactics are strategies that are either inspirational or consultative in nature. The influence from this kind of strategy stems from elements within the person who […]

Grow Yourself along with Your Business

Authenticity is about how you come across to others. When what you say is in alignment with what you do and who you are, others perceive you as authentic. Authenticity comes from speaking in a conversational tone with an intention to communicate from your heart to the other person’s heart. Contrast this with the opposite […]

WHAT STOPS PEOPLE FROM BUYING ONLINE?

WHAT STOPS PEOPLE FROM BUYING ONLINE? A lack of trust and face-to-face interaction prevents many people from purchasing online. It’s a known fact that consumers require a greater level of trust and confidence when buying online than face to face. When you’re dealing with an unknown shop selling products of unknown quality, trust plays a […]

Protection of Systems: Working with Specialist Groups

It’s critical to your success to get involved in specialist groups that monitor and inform their members of what’s important and what’s changing in the world of information security. International organizations such as the Information Systems Security Association (ISSA) and the Information Systems Audit and Control Association (ISACA) are worth getting involved in, since they […]

Prection of Systems: Working with Risk Management

Risk management sits at the heart of everything the information security team does. As such, the information security manager should encourage the business to embed information risk management into every process it uses to deliver its products and services. Every member of staff should be encouraged (and educated) to raise threats, vulnerabilities, and risks with […]

Protection of Systems – Secure Development Business Processes

Secure Development  The information security manager’s role in systems and software development is key. You will be required to ensure that the output from any development projects running in your organization (or outsourced to a third-party development company) is secure, whether they are creating a new line-of-business application or a new infrastructure capability . “But […]

CREATING A SECURITY STRATEGY

The concept of a strategy is often used to describe the way the business will grow or develop over a long period of time with a number of specific targets it wants to achieve: grow by 30%, establish a 55% market dominance, expand into Europe or Australia, and so forth. Strategic targets are often pitched […]