Security
On May 3, 2006, the personal information of over 26 million U.S. veterans was compromised. The stolen personal information included names, dates of birth, social security numbers, and more. The authorities have no leads to investigate the theft, nor can they recover or trace the hundreds of copies that have surely been disseminated by now.
According to studies conducted by the Identity Theft and Resource Center, identity theft affects consumers and businesses in a multitude of ways. Not only do businesses suffer direct loss due to this crime but inadequate security and poor business practices may open a company up to liability suits, fines and loss of clientele. Their research also indicates that nearly 7 million people each year are victims to identity theft in the U.S. alone! If your bank compromised your personal information, what would you do? Would you open a savings account for your kids there, or move all of your accounts to a reliable banking institution?
Acts of Congress such as Gramm-Leach-Bliley Act, Sarbanes-Oxley, and HIPAA demonstrate the importance of information security. These laws have shaped the way we share vital information. More importantly, they can define our professional careers in a matter of key strokes.
The causes of information security breaches are various: disgruntled employees, irresponsible executives, lazy managers, egocentric hackers. The results are distressing: loss of essential data, customer churn, lawsuits, embarrassment. With a Savid Certified network, your exposure to a security violation is minimal.
But why outsource your security? It is a widely accepted practice to place the responsibility of network security with the I.T. Department; however this practice has major downfalls. For one, the responsible party needs to be in direct communication with C-Level executives due to the important nature of information security. An internal I.T. employee who handles security is typically 2-3 layers below an organization's higher executive levels. Secondly, if the I.T Department functions as the Security Department, then it lacks the autonomy and impartiality required to meet its objectives.
A Savid Certified network is comprised of comprehensive network security devises. Our goal is not only to protect your vital information, but to exceed your security goals via implementation of technology and internal policies. Intrusion detection services and constant network monitoring will detect clear text packets leaving your network. We don't just scan the network for the sake of sampling, but constantly inspect and examine each action taken on the network. A Savid Certified network functions in this manner because we know from experience that any action on the network could indicate a security threat or policy violation.
|
COMPANY NEWS
July 12, 2006 Savid Technologies invites clients and friends to an open house!
April 17, 2006
Tony Cannata joins Savid as new VP of Sales.
April 6, 2006
Savid Technologies CEO, Michael A. Davis, speaks about the Next Generation Sebek at CanSecWest in Vancouver, Canada.
December 6, 2005
Savid Technologies CEO, Michael A. Davis, speaks about Deception Technologies at FINSEC in NYC.
|