You guys I must tell you this, it took me a really long time to get on board with using the internet of all things to shop for stuff. I just didn’t feel that my personal information would be safe if I shared it there. The whole concept was so foreign to me and to most people. So believe it or not, I bought my first online item, which was a super cute tanned pair of moccasins, a vintage high-waisted flare denim and two small leather crossbody purse from Lulus.com back in 2008. I know, I missed out on the beginning of Girl Boss.
I know, I know it’s shameful! Mostly because I pride myself on being one who is always the first adaptor – especially when it comes to new technologies. But I was super slow with adapting to e-commerce on the web, but when I did I was hooked in an instant, partly because of the dialogue around how safe it was to shop online had changed to a more encouraging and positive one. Over the years things have change a whole lot. To the point where we need to worry about the safety of our information online. This is why I feel that this weeks post is so important for you guys. If cybersecurity is something you have been thinking about, then today’s post was written just for you by, one of our incredible guest bloggers, Kimona Hudson.
After you’ve read the post it would warm my heart to have you share your thoughts in the comments. I would love to know what you do to protect your personal or private business information when you are doing online transactions.
––––––––––––––––––– GUEST BLOGGER–––––––––––––––––––
Securing tangible assets is very common in businesses. Many business owners will consider this very early in their business operations; especially if they have invested a lot in fixed assets. Many entrepreneurs will also invest in intangible assets, such as software, websites and applications. However, it is not often we consider securing these intangible assets.
Much of the successes being reaped by companies today can be accredited to the use of the Internet and computer technologies. The advent of technology has created an enormous amount of opportunities for businesses to increase their market presence, which can also increase growth and profitability. Many businesses today are using technology as the foundation, on which their business models and structures are created. Companies have invested millions of dollars to build information technology capabilities and platforms. The big question is, how do we safeguard these investments?
This brings us to the very relevant topic of cybersecurity. What is cyber security? According to Techtarget.com, “cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cybersecurity and physical security.”
Elements of cybersecurity include:
Disaster recovery/business continuity planning
Whether you are a multinational or start-up enterprise, cybersecurity must be included in your information technology plan. It is important for business owners to understand and appreciate the value of your business information; which could easily be your most important asset. Think of information, such as trade secrets, that is stored in your company’s database. If this information gets into the wrong hand; it could have serious implications for your business.
Companies have also invested a significant amount of money and time, creating business knowledge and internal capabilities that drive their business processes. Protecting these systems and processes are at the heart of keeping your business safe, productive and profitable. This brings us to information security.
TechTarget.com describes information security (infosec) as a “set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Infosec responsibilities include establishing a set of business processes that will protect information assets regardless of how the information is formatted or whether it is in transit, is being processed or is at rest in storage.”
Visit techtarget.com for more information on cybersecurity.
Kimona is passionate about sharing her knowledge in the form of writing and being a part of the KAI team. She is focused on living a healthy lifestyle filled with lots of fun and laughter.
I hope you enjoyed today’s post. Don’t forget to leave a comment below.
Sending you lots of love and gratitude,