Don’t play around with cyber security

From April 17 – 19, “an illegal intrusion” into Sony’s PlayStation system caused “a compromise of personal information” for up to 77 million user accounts. To put this into perspective, 77 million is only slightly less than the combined populations of the United Kingdom, Ireland, Sweden and Norway.  As with the recent Epsilon data breach, […]

Read more

Dangerous Social Media Risks

KMRD Are You Ready for One Minute From Normal?

At our website www.oneminutefromnormal.com we ask visitors the question: What if an unscheduled event suddenly seizes control of your business? Are you ready? Last month we covered how social media tools can be used to quickly disseminate information should disaster strike your organization or local community. Unfortunately, there is also a risk these tools will […]

Read more

Epsilon data breach lessons

Epsilon, the largest permission based e-mail marketing provider, reported an e-mail addresses data breach this past Friday.  Kroger, JP Morgan Chase, Citi, Capital One, Best Buy, The College Board, Brookstone and TiVo are just some of the companies that have advised their customers about the incident. Although Epsilon is stating that stolen data has been […]

Read more

One Minute from Normal – Using Social Media

KMRD Are You Ready for One Minute From Normal?

At our website www.oneminutefromnormal.com we ask visitors the question: What if an unscheduled event suddenly seizes control of your business? Are you ready? An increasing number of firms are turning to social media to get ready for what can happen one minute from normal. Here’s why: As has been demonstrated during recent unrest in countries […]

Read more

Software Solutions Contract resulted in a $50 Million Lawsuit

KMRD Are You Ready for One Minute From Normal?

It was a happy day when an Enterprise Resource Planning software solutions provider won a hard fought multi-million dollar software/hardware conversion contract. The provider promised the client that its software solution would integrate all operating systems, resulting in a more efficient and cost-effective model. Although all but one module was installed successfully, that last module […]

Read more

1 2 3 4

Got a Problem? We'd Love to Solve It!

Contact Us

top