From the Spring 2023 Issue

High-Tech Layoffs and the Cybersecurity Risks that Result: The Need for a Holistic Approach

Author(s):

Glenn Axelrod, M.S, CISA, CISM, CRISC, HKA Technology Solutions, L.L.C.

In today’s fast-paced, technology-driven business landscape, high-tech layoffs and cybersecurity risks are two critical challenges that organizations must address. The COVID-19 pandemic has accelerated the shift towards automation and digitalization, leading to widespread job losses in various industries. At the same time, the increase in remote work and online transactions has led to a sharp … Read more

From the Winter 2022 Issue

A Comprehensive Approach to Sustain and Secure a Remote Workforce Strategy in 2022

Author(s):

Glenn Axelrod, M.S, CISA, CISM, CRISC, HKA Technology Solutions, L.L.C.

WHY ASKING EMPLOYEES TO RETURN TO THE OFFICE IS MISSING THE MARK (AND HOW YOU CAN FIX IT) Neglecting to implement or continue a remote work option and reap its benefits can result in employees leaving an organization, possibly working for a competitor who does implement one. “If you do not allow flexible or remote … Read more

From the Summer 2021 Issue

How to Decide a Safe and Suitable Business Model in a COVID-19 World for Your Business

Author(s):

Glenn Axelrod, M.S, CISA, CISM, CRISC, HKA Technology Solutions, L.L.C.

How to Decide a Safe and Suitable Business Model in a COVID-19 World for Your Business

Over the last ten years, remote work has increased by more than 100%; between 2017 and 2018, telecommuting increased by more than 20%. The COVID-19 pandemic altered our working environment, and some businesses discovered that they were unable to transition to a fully remote or hybrid workforce model. At the start of the COVID-19 pandemic, … Read more

From the Spring 2021 Issue

Human Psychology Toward Cybersecurity Can Build Value as a Business Enabler

Author(s):

Glenn Axelrod, M.S, CISA, CISM, CRISC, HKA Technology Solutions, L.L.C.

human-psychology-toward-cybersecurity-can-build-value-as-a-business-enabler

Cybersecurity human engagement is not always apparent. Attack victims are particularly vulnerable; therefore, cybercriminals utilize pre-defined destructive motivations. Nevertheless, users worldwide continue to hand over confidential information unintentionally, or merely because of curiosity. Cyber adversary actions are usually the subject of research (i.e., what we do and what we could have done to prevent the … Read more