Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Episode 84 | Who can you trust? What 30 years in the military teaches you about information security

August 03, 2020

Episode 84 | Who can you trust? What 30 years in the military teaches you about information security


If you received an email informing you that you’ve been laid off due to the downturn of the economy, would you believe it?
 
A lot of us probably would.
 
That’s just one of the phishing awareness techniques JC Vega, executive security advisor at IBM Security, uses to teach organizations about information security. In this episode of B2B Tech Talk, JC talks about phishing emails in addition to…
 
  • The importance of centralized planning in the military and within an organization
  • Why employees should have zero trust especially when working from home
  • 3 easy things to do to protect yourself when working from home
"We have to evolve together: from the end user to the most technical person. There's a role in security for all of us and we have to embrace that role." — JC Vega
 

Clear leader intent

The key to a successful information security strategy is a clear intent (end goal) from the leader. Whether it be the CEO, CISO, or another executive, a security initiative has to come from the top and be 100% supported in order for it to work.
 
This way, the rest of the organization will feel responsible for the state of security. It takes buy-in from the entire team to keep an organization secure, especially when working from home.
 

Culture of secure behavior

The organizational culture of secure behavior starts at the top but relies on everyone else to succeed.
 
3 things all organizational members can do today to protect themselves and the company when working from home:
 
  1. Isolate your network. With modern routers, you’re able to separate your guest, primary and work Wi-Fi networks. This will help to keep your most crucial network secure.
  2. Dedicate your devices. Your work computer is your work computer. Your work phone is your work phone. Don’t compromise these devices by using them for personal projects.
  3. Keep devices up to date. Make sure your systems have updated security software. That goes for your desktop, laptop, tablet and phone.
A culture of secure behavior affects everyone in the organization. If each individual is informed and empowered by leadership to take information security seriously, you’re on the right track to winning in the fight against cybercrime.
 
Hear more about IBM Security in ep. 71
 
Explore IBM Security solutions here. For more information, connect with JC on LinkedIn or email Austin.Crage@ingrammicro.com
 
To join the discussion, follow us on Twitter @IngramTechSol #B2BTechTalk
 
Listen to this episode and more like it by subscribing to B2B Tech Talk on Spotify, Apple Podcasts, or Stitcher. You can also listen on our website.