Laurie Head is co-owner of AIS Network, leading all facets of corporate communications, content and culture and occasionally guiding clients who need award-winning application development. After careers in broadcast journalism and public affairs, Laurie went out on a limb in 1998 to direct communications for an investment bank’s technology practice. At the time, there were few women working in IT, and she got a buzz out of breaking new ground. Since then, Laurie has never looked back, embracing her various roles in the industry and inspiring and mentoring young colleagues along the way. She’s one part entrepreneur, one part communications executive, one part wordsmith, one part geek, one part volunteer and two parts mom. When she’s not playing any of those parts or blogging, she’s walking the dog.

risk-assessment

Risk Assessments Can Save Your Business

Risk Assessments Can Save Your Business Think risk assessments can save your business? You’re right. A risk assessment is a critical component of any organization’s infrastructure. They help to create an awareness of risk. In today’s threat landscape, specifically relating to cybersecurity, it’s more important than ever to know where your assets live, fully understand…

ensuring security

Ensuring Security and Compliance

Ensuring Security and Compliance Most organizations tend to focus on becoming compliant rather than being secure. And while meeting client requirements and industry regulations is very important, it does not necessarily guarantee that your organization is secure. If your entire information security program is based on “What must we do to be compliant?”, you’re probably…

information security program

Information Security Program Is Critical

Information Security Program Is Critical An information security program is a critical component of any organization regardless of the size of your business or the industry you’re in. A good information security program consists of a comprehensive set of information security policies and procedures, which is the cornerstone to any information security program. Whether you’re…

avoid data breach

Steps to Avoid a Pricey Data Breach

Steps to Avoid a Pricey Data Breach   Are you swimming in information security concerns? Avoid a pricey data breach by reading further. Recent and startling new malicious attacks are causing organizations to re-think everything we know about our security posture – from breach prevention to response. Organizations are beginning to shift their focus on…

driving cloud initiatives

What’s Driving Your Cloud Initiatives?

What’s Driving Your Cloud Initiatives?   What business goals or objectives are driving cloud initiatives at your company? Could they be among these? Lower total cost of ownership (TCO) Improving customer support or services Gaining a competitive edge Enabling innovation Enabling business continuity Speed of deployment Replacing on-premise legacy technology  Savings on CAPEX (capital expenditures)…

AISN google snapshot

Our Site Was Not Hacked

Our Site Was Not Hacked No. Our site was not hacked. Period. Yesterday, a customer Googled us only to find this — under our name, a notation from Google, which indicated “This site may be hacked.” Since our core strength is security and we are regularly audited by independent auditors to ensure our 24x7x365 security…

passing SOC 2 audit

Passing Your SOC 2 Audit

Passing Your SOC 2 Audit   How should you prepare for passing your SOC 2 audit? The pressure is on as more and more service providers and service organizations are being asked by clients for a SOC 2 audit report. Are you prepared to demonstrate your commitment to security and privacy to your clients and…

Ransomeware Defense

WannaCrypt Ransomware Defense

WannaCrypt Ransomware Defense Looking for WannaCrypt ransomware defense? On Friday, May 12th, a large ransomware attack was launched, known as WannaCrypt (a.k.a. WannaCry). It infected more than 230,000 computers across 150 countries. This unprecedented cyberattack left organizations struggling in the aftermath as they try to recover. WannaCrypt demands payment of ransom in bitcoin and has…