• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us
OCDTECH. PEOPLE PROCESSES CYBERSECURITY

People, Processes, and CyberSecurity? 

October 19, 2023 Posted by Jeff Harms Cybersecurity, disaster recovery

Three points of focus for ALL managers

These days it is not uncommon to have one or more “past work lives”.  We use that term freely when networking or simply chatting with friends. In my most recent “past work life” prior to joining OCD Tech, I was a director of operations for a group of twenty employees at a local law firm.  We worked daily to meet and exceed the client’s needs, extinguishing emerging fires, while also trying to prevent new ones.  It was a fantastic and chaotic experience that I loved. 

Access

Part of that experience involved routine tasks that I now look back on through a different lens.  Our client requirements and our own good cyber hygiene combined to increase our level of cybersecurity and knowledge.  On a quarterly basis (and sometimes more often), I was required to review and approve all levels of client access and software use for each of my employees.  I initially viewed this as a “busy” task that I completed when time permitted (usually the day of the deadline).  As time went on however, I began to see the importance of minimizing access to those employees that no longer worked with a specific client.  Dormant software was removed from those terminals with employees that were reassigned to other projects.  Ultimately, I used this review as an assist for how I managed personnel.   

Disaster Recovery and Continuity Plan

Another regularly scheduled task that I helped lead was testing our Disaster Recovery and Business Continuity Plan.  Prior to joining the firm, I had very little experience with these plans, however I quickly realized how important they were.  The team would “shut down” once power or internet service was removed (or any other disaster was revealed), and test how quickly we could be back online to continue service for our clients.  Each test revealed different aspects of the plan to work on – laptop access, client website locations, updated login information, and current client contact lists (with phone numbers).  These tabletop exercises were extremely valuable in teaching the staff the importance and testing of the written plans. 

Training

As managers in non-IT businesses, taking advantage of each opportunity to discuss and demonstrate the importance of cybersecurity is an easy step towards educating your team.  We often focus on the day to day needs of the staff, from job training to team building exercises.  However, we do not spend enough time on the one item that could cause the most damage to the organization.  Just one cyber attack of any kind can lead to client trust issues, loss of business, lower office morale, and public relations issues. Managers routinely discuss staff needs for ultimate success, yet how often is cybersecurity training included in that list?  Any manager of any size business should push for training, specifically email and social phishing training as these are the most common forms of exposure.

So, use your position to help protect your business, staff and reputation.  Seek the necessary training and reinforce its purpose often.  Perform the functions required with a sense of protection and preparation.  It will be time well spent.    

Share
0

About Jeff Harms

This author hasn't written their bio yet.
Jeff Harms has contributed 2 entries to our website, so far.View entries by Jeff Harms

You also might be interested in

Cybersecurity Spend

Cybersecurity Spend

Apr 22, 2019

A study by ZDNet reveals that 80% of organizations planned to increase their security spend in 2019 compared to their 2018 spend. 

NCSAM – Week 2 – Cyber from the Break Room to the Board Room

Oct 12, 2016

Week 2: October 10-14, 2016 – Topic: Cyber from the[...]

OCDTech Takes 1st Place!

Oct 27, 2019

OCD Tech earns 1st place in the Trend Micro Threat[...]

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us
Prev Next