<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TransAccel Group &#187; assessment</title>
	<atom:link href="http://transaccelgroup.com/tag/assessment/feed/" rel="self" type="application/rss+xml" />
	<link>http://transaccelgroup.com</link>
	<description>Improving IT Processes &#38; Services</description>
	<lastBuildDate>Tue, 03 Jul 2018 13:13:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.2.38</generator>
	<item>
		<title>ASSESSING YOUR ORGANIZATION’S CYBER SECURITY: THINK YOU’RE UP TO IT?</title>
		<link>http://transaccelgroup.com/2015/03/11/assessing-your-organizations-cyber-security-think-youre-up-to-it/</link>
		<comments>http://transaccelgroup.com/2015/03/11/assessing-your-organizations-cyber-security-think-youre-up-to-it/#comments</comments>
		<pubDate>Wed, 11 Mar 2015 16:58:56 +0000</pubDate>
		<dc:creator><![CDATA[Bruce Lotier]]></dc:creator>
				<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[assessment]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Security Assessment]]></category>
		<category><![CDATA[Security Compliance]]></category>
		<category><![CDATA[Security Training]]></category>

		<guid isPermaLink="false">http://ws2.telnex.us/~transaccelgroup/?p=5969</guid>
		<description><![CDATA[The Enron debacle will forevermore be a parable about delusional self-auditing. In much the same way, Cyber Security should never be assessed using internal staff and mechanisms, the ramifications of missing something are simply too great. According to Cenzic ‘s Application Vulnerability Trends Report: 2014, “While the majority of corporations have the important security building blocks, such as firewalls and intrusion protection systems needed for their security infrastructure, not enough organizations have comprehensive tools and practices in place for securing applications.” Faced with a worldwide shortage of Cyber Security professionals (Cyber Security has only recently become a discipline one may major in!), and companies unable to afford the overhead necessary for the requisite training, this situation is not surprising. Bad news for you. Good news for hackers. Still think you can go it alone? Do you really understand the sheer magnitude of possible vulnerabilities? Here’s a sobering thought: Everything on the network is hackable. Everything—from your corporate computers to a 3rd party vendor to your employees’ Smartphones. Add to this the risky behaviors employees can engage in—sharing passwords, inappropriate web browsing, copying sensitive data onto mobile devices—and you’ve got exposure. Lots of it. An objective Cyber Security assessment can assist with evaluation and establishment of controls to: Implement an information risk management program Ensure network security is adequate, including boundary and internal Guide user education and awareness Verify malware protection and prevention Deal with secure configuration and patch management for devices (network, servers, PCs) Manage user access and privileges Handle incident management Assist with home and mobile working If you feel you aren’t ready to tackle all the items above, you should at least undertake a basic evaluation to consider only the most foundational building [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The Enron debacle will forevermore be a parable about delusional self-auditing. In much the same way, Cyber Security should never be assessed using internal staff and mechanisms, the ramifications of missing something are simply too great.</p>
<p>According to Cenzic ‘s Application Vulnerability Trends Report: 2014, “While the majority of corporations have the important security building blocks, such as firewalls and intrusion protection systems needed for their security infrastructure, not enough organizations have comprehensive tools and practices in place for securing applications.” Faced with a worldwide shortage of Cyber Security professionals (Cyber Security has only recently become a discipline one may major in!), and companies unable to afford the overhead necessary for the requisite training, this situation is not surprising. Bad news for you. Good news for hackers.</p>
<p>Still think you can go it alone? Do you really understand the sheer magnitude of possible vulnerabilities? Here’s a sobering thought: Everything on the network is hackable. Everything—from your corporate computers to a 3rd party vendor to your employees’ Smartphones. Add to this the risky behaviors employees can engage in—sharing passwords, inappropriate web browsing, copying sensitive data onto mobile devices—and you’ve got exposure. Lots of it.</p>
<p>An objective Cyber Security assessment can assist with evaluation and establishment of controls to:</p>
<ul>
<li>Implement an information risk management program</li>
<li>Ensure network security is adequate, including boundary and internal</li>
<li>Guide user education and awareness</li>
<li>Verify malware protection and prevention</li>
<li>Deal with secure configuration and patch management for devices (network, servers, PCs)</li>
<li>Manage user access and privileges</li>
<li>Handle incident management</li>
<li>Assist with home and mobile working</li>
</ul>
<p>If you feel you aren’t ready to tackle all the items above, you should at least undertake a basic evaluation to consider only the most foundational building blocks for cyber security.</p>
<p>In a survey of its 3,400 global members, Information Systems Audit and Control Association (ISACA) found that although 83% of the respondents recognized Cyber Attacks as among their “top three threats,” only 38% felt prepared to endure one. Make sure you are part of that 38%. If you do nothing else, purchase cyber insurance. If you are ready to take additional steps, we can help.</p>
<p>P.S. On our C4C blog we recently wrote about the fallacy of thinking you are too small to garner a hacker’s attention. I can’t stress the following enough: While big companies more often make the news by getting breached for millions of records, they also have the financial resources to dig out of that hole. Small companies aren’t as lucky. A data breach at a small company can mean closing the doors, for good. Don’t let that happen.</p>
]]></content:encoded>
			<wfw:commentRss>http://transaccelgroup.com/2015/03/11/assessing-your-organizations-cyber-security-think-youre-up-to-it/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyber Security: No Company is Too Small</title>
		<link>http://transaccelgroup.com/2015/02/25/cyber-security-no-company-is-too-small/</link>
		<comments>http://transaccelgroup.com/2015/02/25/cyber-security-no-company-is-too-small/#comments</comments>
		<pubDate>Wed, 25 Feb 2015 17:38:39 +0000</pubDate>
		<dc:creator><![CDATA[Bruce Lotier]]></dc:creator>
				<category><![CDATA[Security Assessment]]></category>
		<category><![CDATA[assessment]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Information Security]]></category>

		<guid isPermaLink="false">http://ws2.telnex.us/~transaccelgroup/?p=5972</guid>
		<description><![CDATA[CYBER ATTACKS: NO COMPANY IS too small Many companies think because they are small they are immune to a cyber attack—after all, they do not have the net worth of, say, Target ($38B) or Home Depot ($55B) or Walmart ($250B). This is a dangerous misconception. The fact is, whether you are worth millions or billions you are at risk, and your insignificant size might be the very thing putting you in jeopardy. What makes a small business attractive to hackers? For one thing, smaller enterprises often don’t have the resources to implement the programs and training necessary to prevent, detect, and recover from attacks. Larger organizations do have the resources (including insurance) to weather a breach, but smaller ones may suffer irreparable damage. Another attractive difference is that while larger companies have a more holistic, integral view of IT security that extends across an enterprise, smaller companies tend to have a more myopic view where IT security is relegated to, well, IT. In addition, since smaller companies often have less sophisticated firewalls and detection programs, they may be targeted as a portal for later use as conduits to larger organizations. For example, preliminary investigations indicate that the mess at Target may have been initiated by an employee of their HVAC vendor who opened a malware-laden email. It has been said that you are only as strong as your weakest link, and all too often, that link is human. Whether you recognize it or not, your organization’s systems and data are exposed in countless ways, including via mobile apps, third party vendors, remote employees, former employees, cloud storage, weak passwords, neglected legacy systems, and social media. In its September 30th report, Managing Cyber Risks in an [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>CYBER ATTACKS: NO COMPANY IS too small</p>
<p>Many companies think because they are small they are immune to a cyber attack—after all, they do not have the net worth of, say, Target ($38B) or Home Depot ($55B) or Walmart ($250B). This is a dangerous misconception. The fact is, whether you are worth millions or billions you are at risk, and your insignificant size might be the very thing putting you in jeopardy.</p>
<p>What makes a small business attractive to hackers? For one thing, smaller enterprises often don’t have the resources to implement the programs and training necessary to prevent, detect, and recover from attacks. Larger organizations do have the resources (including insurance) to weather a breach, but smaller ones may suffer irreparable damage. Another attractive difference is that while larger companies have a more holistic, integral view of IT security that extends across an enterprise, smaller companies tend to have a more myopic view where IT security is relegated to, well, IT. In addition, since smaller companies often have less sophisticated firewalls and detection programs, they may be targeted as a portal for later use as conduits to larger organizations. For example, preliminary investigations indicate that the mess at Target may have been initiated by an employee of their HVAC vendor who opened a malware-laden email. It has been said that you are only as strong as your weakest link, and all too often, that link is human.</p>
<p>Whether you recognize it or not, your organization’s systems and data are exposed in countless ways, including via mobile apps, third party vendors, remote employees, former employees, cloud storage, weak passwords, neglected legacy systems, and social media. In its September 30th report, Managing Cyber Risks in an Interconnected World: Key Findings from The Global State of Information Security Survey 2015, PricewaterhouseCoopers writes,</p>
<p>We also saw increases in attacks on connected consumer devices— such as baby monitors, home thermostats, and televisions— that comprise the Internet of Things, a nascent ecosystem of devices that interconnect information, operational, and consumer technologies. These Internet-connected devices are vulnerable to attack because they lack fundamental security safeguards…</p>
<p>According to Gartner’s 2014 Magic Quadrant for Security Information and Event Management, “more than 92 percent of breaches [are] undetected by the breached organization.”</p>
<p>Are you still feeling invulnerable? No matter how small your organization is, cyber hacking is an equal opportunity threat. As such, cyber security is no longer the province of IT; it is the province of everyone in your organization from the C-suite on down.</p>
<p>Our information security and risk assessment service will help you understand where you have critical risks in your cyber security landscape. If you are feeling uneasy or uncertain about your information security, let us know. We can help.</p>
]]></content:encoded>
			<wfw:commentRss>http://transaccelgroup.com/2015/02/25/cyber-security-no-company-is-too-small/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Rx: Annual IT Health Check</title>
		<link>http://transaccelgroup.com/2011/07/26/rx-annual-it-health-check/</link>
		<comments>http://transaccelgroup.com/2011/07/26/rx-annual-it-health-check/#comments</comments>
		<pubDate>Tue, 26 Jul 2011 20:24:27 +0000</pubDate>
		<dc:creator><![CDATA[Bruce Lotier]]></dc:creator>
				<category><![CDATA[Assessment]]></category>
		<category><![CDATA[assessment]]></category>
		<category><![CDATA[capacity]]></category>
		<category><![CDATA[IT maturity]]></category>
		<category><![CDATA[Planning]]></category>
		<category><![CDATA[strategy]]></category>

		<guid isPermaLink="false">http://ws2.telnex.us/~transaccelgroup/?p=6109</guid>
		<description><![CDATA[Welcome to TransAccel’s inaugural blog! I’ve been eagerly anticipating the opportunity to talk to you about what I see as the biggest challenges facing IT and business today. To stimulate my thinking around the new adventure of blogging, I’ve been reflecting on the many years my colleagues and I have strategized, innovated, and just generally cleaned up messes. You have your stories too. This is the place to share them, and we hope you do. Over the next few months members of my team and I will be writing about: Where to start? For me it all begins with a good understanding of who you are, where you are, and where you would like to be. And, just as an annual physical exam uncovers potential health issues, we insist on a “IT Health Check” too. After all, how can we know what remedial measures to take without an initial assessment? Now, it seems pretty obvious that getting an annual check-up is smart and generally contributes to better health, right? Well, how many IT organizations put off a yearly exam and try to self diagnose? Worse yet, how many IT organizations have never even had an exam—you know, an independent review of how they operate? Interestingly, when we do a “Health Check,” we find that most IT organizations today are similar in two respects. First—and to the seeming surprise of Business—IT is made up of human beings who have the same issues as everyone else: lack of trust, fear of conflict, lack of commitment, avoidance of accountability, inattention to detail, and indifference towards results. Having been in the business some 30 years I can tell you without question that these “soft” skills are just as important [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Welcome to TransAccel’s inaugural blog! I’ve been eagerly anticipating the opportunity to talk to you about what I see as the biggest challenges facing IT and business today. To stimulate my thinking around the new adventure of blogging, I’ve been reflecting on the many years my colleagues and I have strategized, innovated, and just generally cleaned up messes. You have your stories too. This is the place to share them, and we hope you do.</p>
<p>Over the next few months members of my team and I will be writing about:</p>
<style type='text/css'>
  #checklist-1 li:before{color:#757575 !important; content:'\f111' }
	</style>
<ul id="checklist-1" class="list-icon circle-no list-icon-fa-circle">
<li>IT Maturity</li>
<li>Capacity for Change</li>
<li>Operational Effectiveness</li>
<li>Measurement and Metrics</li>
<li>Governance</li>
<li>Portfolio Management</li>
<li>Change Management</li>
<li>Leadership and Organization Development</li>
<li>Vendor/Service management</li>
<li>Communities of Practices</li>
<li>Innovation <i>(my personal favorite)</i></li>
</ul>

<p>Where to start? For me it all begins with a good understanding of who you are, where you are, and where you would like to be. And, just as an annual physical exam uncovers potential health issues, we insist on a “IT Health Check” too. After all, how can we know what remedial measures to take without an initial assessment?</p>
<p>Now, it seems pretty obvious that getting an annual check-up is smart and generally contributes to better health, right? Well, how many IT organizations put off a yearly exam and try to self diagnose? Worse yet, how many IT organizations have never even had an exam—you know, an independent review of how they operate? Interestingly, when we do a “Health Check,” we find that most IT organizations today are similar in two respects.</p>
<p>First—and to the seeming surprise of Business—IT is made up of human beings who have the same issues as everyone else: lack of trust, fear of conflict, lack of commitment, avoidance of accountability, inattention to detail, and indifference towards results. Having been in the business some 30 years I can tell you without question that these “soft” skills are just as important as “tech” skills to the success of IT initiatives and operational effectiveness.</p>
<p>Second, today IT stands poised at a crossroad. On the one side are the Business demands: compliance with internal and external regulations, security of information and assets, maintenance of IT architectural integrity and stability, and the delivery of innovative technology. On the other side are the obstacles to fulfillment: a rapidly changing workforce, a lack of leadership expertise, budgetary restraints, the shifting of non-core activities to external resourcing partners, and the fact that every department can make individual hardware and software decisions. The resulting tension and stress on IT cannot be overstated.</p>
<p>Considering these problems along with the scant resources spent on infrastructure, i.e., leadership and management training and development (that soft skills stuff I mentioned earlier), it is no surprise to me that most IT organizations are running full bore and still unable to meet the myriad Business objectives. We refer to this phenomenon as “no capacity to change,” and it is this very inability that is misconstrued as a lackluster attitude toward innovation, the very “innovation” that is supposed to save our beleaguered economy.</p>
<p>The challenges facing IT are complex; I won’t deny that. But they are not insurmountable. And, because this is my first blog, I feel compelled to tell you how deeply committed I am to helping IT employees and organizations work differently and maturely so that every individual and organization as a whole can deliver its very best. I want to give them the tools to work in new ways that are uplifting and rewarding. But most of all, I am determined to help IT gain the capacity to change and to attain its rightful place at the center of business driving innovation. By the way, this is what our consulting firm is all about.</p>
<p>Please check in from time to time. I’ll be here sharing my thoughts and specific ideas about specific issues—it would be great to hear from you too. For now, my parting thought is this: Get checked-out sooner rather than later so that you and your organization can begin to focus on innovation. After all, we have an economy to save.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://transaccelgroup.com/2011/07/26/rx-annual-it-health-check/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
