• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

NCSAM – Week 2 – Cyber from the Break Room to the Board Room

October 12, 2016 Posted by W. Jackson Schultz, CISA Cybersecurity, IT Security

Week 2: October 10-14, 2016 – Topic: Cyber from the Break Room to the Board Room


We are all part of protecting personal and organizational data in the workplace. From CEO to incoming entry-level employees, each organization’s cybersecurity posture is reliant on a shared level of vigilance and awareness. Week 2 looks at how every employee can promote a culture of cybersecurity at work.

Let’s start at the top.  As a long standing board member of an organization, cybersecurity might seem like a topic in its infancy.  “Why do we have to talk about this now… and here” was a common phrase spoken in the boardroom roughly five years ago.  Today, board responsibility regarding security has never been greater.  Risk acceptance lies with the board, which means that there has never been a more important time to understand cyber threats, cyber risk, and security awareness.

Executive and general management professionals have a responsibility of their own, related to cybersecurity.  These are the individuals whose credentials are the most valuable.  More of a curse than a blessing, these leaders are the ones the hackers will be targeting.  Often times, Chief Financial Officers are attacked with, and fall for, common scams like CEO Wire Fraud.  In some cases, when information security team members are performing a social engineering or phishing test, they will not target management out of fear of being reprimanded for fooling them.  Unfortunately, if these individuals do not receive the training they need to identify red flags within a phishing message, they could be susceptible to falling for a scam and wiring a potentially detrimental amount of money.

Middle management and staff level employees are critical to an organization’s survival.  This is the largest group of employees, which equates to massive sample size for an attacker.  If one of these staff members happens to click on a malicious email, it could be game over for their company.  It’s important that these individuals understand their role regarding information security and stay up-to-date and educated on emerging threats and security trends.

Every individual within an organization plays a crucial role in securing the technical infrastructure, whether they like it or not.  From the break room to the board room, all employees must continue to ensure the confidentiality, integrity, and availability of sensitive data their company maintains.  A company is only as secure as its weakest link – don’t let that be you!

To learn more about cybersecurity and to protect your data, contact us at 617-471-1120 today!

Tags: CYBERcyber securityCYBERAWARE
Share
0
Avatar photo

About W. Jackson Schultz, CISA

Jackson is a senior auditor with OCD Tech. Currently, Jackson performs IT audit control testing for OCD Tech clients.

You also might be interested in

SSH Tunneling – Mr. Smith’s Hacker Insights

SSH Tunneling – Mr. Smith’s Hacker Insights

Jun 12, 2019

n this installment of Hacker Insights, we’ll take a deep dive into one of the mechanisms hackers....

CMMC Details Emerge

CMMC Details Emerge

Jul 31, 2019

The DoD is releasing more information about the upcoming CMMC standard.

OCDTECH.FRAUDLOSSES2023

Fraud Losses Top $10 Billion in 2023 

Feb 20, 2024

Newly released Federal Trade Commission data show that consumers reported[...]

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us
Prev Next