LeadershipPosted by AJ van de Kam Sun, January 04, 2015 16:18:51
Change, You Owe It To The Shareholders, Customers and Clients!
Change, You Owe It To The Shareholders, Customers and Clients!People don't want CHANGE!
In order to get change, you need senior management to push it and they only want their stock options to become worth something.
Besides, for most of them, it's the next guys problem.
People also do not want responsibility and accountability for their data. They have no clue about how to properly manage and protect data nor do they care.
But ask them about IT and they are now all experts because they have PC/MAC’s, Smart Mobile Phones and Tablets and can barely use Excel!
It is your Corporate Governance and Duty of Care to the Shareholders, Board of Directors, Clients and Customers to Make Change!
Success and Failure Is In Your Hands and Personal Thoughts Go By The Wayside.
SecurityPosted by AJ van de Kam Sun, January 04, 2015 16:17:16
Ignorance, Burying Your Head In The Sand Or Is It Lack of Testicular Fortitude?
Ignorance, Burying Your Head In The Sand
or Is It Lack of Testicular Fortitude?
People are stealing your stuff!
What is it with you folks? Are you happy that people want your very personal information, raid your bank account, take away ill-affordable time to reconstitute your life, break-in to your home, steal your corporate data, know the inner secrets of your life, family and company that you built and you just go about life as if nothing of importance has even happened.
This is not a game! This has got to a level while you are sitting and stand by, twiddling your thumbs, as if you can do nothing about it!
You can, we can! We can!
TRUSTED REMEDY is a Public-Key Infrastructure that takes computer usage to a level of security only previously dreamed of, without the hassle, misunderstanding and complex, time consuming managerial criteria’s, without one iota of compromise.
TRUSTED REMEDY states that we have increased security with our patented proprietary software and passionately protection from the corporate data to the very personal and individual data of everyone. To say we dislike hackers and phishers is an underestimation! TRUSTED REMEDY is passionate in the fight and solution to eradicate those lowlifes.
Every time you use your credit/debit card you are risking enormous problems and the banks, retail trade, online shopping, restaurants, in fact, anywhere you use that card you are baiting the hackers, phishers and Man in the Middle Attackers to come get your information and use at their will.
Your corporate data in motion is at risk each and every time you transmit the information. Your IT department is always in aretroactive mood, fighting the next unsociable event.
It is the proactive approach of TRUSTED REMEDY and our original creators that continues to this day. We have incorporated industry standard solutions which have stood the test of time, you know what they say, “if it an ‘it broken, don’t fix it or touch it”.
It does not have to be that way, always fighting the unseen enemy, those that hide behind screens, smiling, rubbing their hands as they inflict pain and agony on us all.
This is not marketing talk, it is down to earth advice to stop these morons and protect you from these events.
Yesterday, my business partner received an email from a man that is an IT Consultant and Software Developer and works for a major data transmission company. I have extracted from his unsolicited comment:
“Thanks for the information. I looked over the stuff you send me and it looks interesting. The TRUSTED REMEDY system has some good selling points, especially the fact that it could be integrated in existing systems without replacing an entire system.
This is usually the major hurdle you have to overcome, but it looks like that this is something you can add to your existing IT infrastructure and is easy to implement.”
We thank him for his unsolicited honesty. Yes, TRUSTED REMEDYis simplistic and can integrate with any existing system with so much easy, it is a welcome solution to work with.
If you make things easy to implement and have virtually zero management, people regard the results even more.
What else do we say? You know what is happening every moment of the day, these criminals, cyber-terrorists are costing us all billions of dollars and the solution is right here on these pages.
LeadershipPosted by AJ van de Kam Tue, December 30, 2014 09:58:02
One of the most baffling and recalcitrant of the problems which business
executives face is employee resistance to change. Such resistance may take a
number of forms—persistent reduction in output, increase in the number of
“quits” and requests for transfer, chronic quarrels, sullen hostility, wildcat
or slowdown strikes, and, of course, the expression of a lot of pseudo logical
reasons why the change will not work. Even the more petty forms of this
resistance can be troublesome.
All too often when executives encounter resistance to change, they
“explain” it by quoting the cliché that “people resist change” and never look
further. Yet changes must continually occur in industry. This applies with
particular force to the all-important “little” changes that constantly take
place—changes in work methods, in routine office procedures, in the location of
a machine or a desk, in personnel assignments and job titles.
No one of these changes makes the headlines, but in total they account
for much of our increase in productivity. They are not the spectacular
once-in-a-lifetime technological revolutions that involve mass layoffs or the
obsolescence of traditional skills, but they are vital to business progress.
Does it follow, therefore, that business management is forever saddled
with the onerous job of “forcing” change down the throats of resistant people?
My answer is no. It is the thesis of this article that people do not resist
technical change as such and that most of the resistance which does occur is
SecurityPosted by AJ van de Kam Thu, December 25, 2014 14:30:55
PRIVACY - FOCUS OR BE SCREWED
Focusing on the total business and not for one minute taking your eyes off the road map of your company, should be attained by all.
It is not!
The majority of board members and C-Level executives, the hired help, are wearing blinders and think others will inform and protect them.
They do not!
It is their job to protect and serve the shareholders and customers/clients or have they forgotten that!
The words, "I never saw this coming", are echoed globally at all levels of companies on a minute by minute basis. Who do they have to blame?
Sorry, that is the way it is, it is like someone sent out a script and all are following along.
Privacy is the #1 Priority. I do not mean shutting yourself in a small room and never venturing outside. We mean information created and amassed by a company is only for that company, it is private, not public.
Ask Sony, Home Depot, Target, JP Morgan Chase, etc., how they feel about privacy and prying criminal eyes that have Hacked their way inside the inner sanctum of their corporations and stolen information. Downright criminals that strike, steal and move on the next one. Are you next?
We all have said or done something that we wish we had not. The record of that event is not for public view. Tell that to a Hacker! They are laughing and getting their kicks watching those they have been compromised squirm and wiggle as they release the information.
FOBS or Focus Or Be Screwed is a great acronym to be followed, as it is says it all. If your Privacy is compromised, you, your employers and customers/clients are SCREWED! Embarrassment is one thing, potentially damaging private information is quite another.
As a C-Level executive, have you any idea what is collected, stored and secured within your company databases? Don't answer that with, "that is what I pay an IT Department for". It is your job to be a know-it-all! Most of you are coming up drastically short in that department!
CommSmart Global says it as it is and will assist you in locking down your in-house data and your corporate data in motion. Are we blunt and to the point? Damn right we are! We are not looking for friendship, we are securing your business for all involved and importantly, your shareholders and clients.
Our privacy investigative attributes and solutions have been gleaned by having a worldwide team that has no airs and graces, just the abilities to understand the hackers mentality, operational methods and how they can enter your systems to steal any single thing they want from your databases.
Yes, we are Ethical Hackers and Penetration Testers with secure credentials and full understanding of the real data security world. That is part of what we do and we use our own solutions within the other sectors of our global business.
Once we establish the gaping holes in your data security we close them and allow you to manage your daily movements with technology that informs you all aspects of the data flow, who is accessing and what tripwires need to be in place to stop any unauthorized access. CommSmart Global works hand in hand with your C-Level executives and with their direction, the IT department heads.
Even your data from the field, the Smart Mobile Phones, Tablets, Phablets and Laptops are protected. The data in motion becomes invisible, even in a Public Wi-Fi Hotspot. This also includes the desktop inside computers, which now are secure, even at executives or staff's homes.
So, do you want to be Focused or Screwed?
CommSmart Global and Your Privacy go hand in hand, call us or email and let us discuss your needed privacy solutions now!