The Weidenhammer Blog

CIO Mindset – Enable and Govern

April 9th, 2014 | Category: Network Security

Historically the role of the CIO was to centralize and control IT resources and data and then somehow move the organization forward.  Frequently that meant saying NO to users with routine and even innovative requests. A recent post by one of my Weidenhammer colleagues got me thinking about a better approach to moving the business…

Share
Read More

If You Have a Proper Business Continuity Management Program…Let it Snow

February 17th, 2014 | Category: Technology

With the recent parade of snow storms throughout the country, it leads one to think about the impact these weather events have on our clients.  The availability of personnel, effects on production, fractures in organizational productivity – all result in businesses not being able to deliver their products and services and protect the reputations that…

Share
Read More

Critical Security Controls Permeate Everything We Do

January 30th, 2014 | Category: Network Security

I recently attended a local security session that highlighted the TARGET data breach and procedural deficiencies many organizations have in their operations. Per the speaker, Lance Hawk of Computer Forensics & IT Security, the highly publicized data breach was the result of a hack of Target’s Point-of-Sale (PoS) system using malware called Dexter.  The PoS…

Share
Read More