My Story
Years ago, my mom’s email account was compromised and some hacker sent out spam from her account. Because I wasn’t living nearby, it took a couple days to walk her through the password change process through her ISP. From then on, I started developing strategies and collecting tools to prevent similar compromises as well as limit their impact.
My Message
Many businesses thrive through the use of technology. And while getting the benefit from the technology is something you’ve managed to accomplish, there are vulnerabilities and risks that you may be exposed to.- What if someone were to get copies of your data? (customer files, marketing data, payroll information)
- What if you were not able to get access to your data?
- What if someone posed as you online? (email, access other websites, etc.)