I have heard it said at various Information Security trainings and conferences that “Your greatest vulnerability as an organization is the employee.” From an IT security standpoint I cannot argue with that statement in the broad sense. What with unauthorized surfing habits, phishing emails that are opened, malware brought into the system via “Coupon” applications and other bad user habits.
But what if I told you that you can turn each membertransition them from a vulnerability to an asset? What if I told you it was extremely inexpensive to do so, and that the Return-On-Investment would be measured in hours or days and not in years?
Continue reading →