How a Six Sigma Approach for Improved Cybersecurity Can Work

Using a Six Sigma Approach for Heightened Cybersecurity Lately, cybersecurity has been at the forefront of many blogs and forums around cybersecurity.  From spear-phishing email attacks at the White House to national cyber-attacks, frequently blamed on China, North Korea, and Russia. Fortunately, many organizations have recognized this and are now putting dedicated cyber security teams […]

IT Asset List

Use this basic IT asset list to get organized.  Way too often do small startups scale so quickly that when financing is required and due diligence takes place, things get way out of control. Keep tabs on your IT inventory – be sure to know who has what.  Also, every financial controller knows the importance […]