Threatucation Logo
CALL US
302-537-4198
Creating a Culture of Cyber Security in small- to mid-sized organizations
  • Home
  • Services
    • Risk Assessment
    • Security Policies
    • Security Awareness Training
    • Scam Support
    • Cyber Security Solutions
    • Backups
  • Security Awareness Training
  • Testimonials
  • About
  • Blog
  • Reports
  • Contact

Security in the Supply Chain

June 7, 2019 by Eric Magill

If you haven’t already, chances are you will be required in the next year or two to submit proof to a supplier or customer that you are taking all reasonable precautions to secure their data or network when you access them. Learn more here …

Filed Under: Uncategorized

Share:

Market Your Security Measures

April 12, 2019 by Eric Magill

If you look at your security measures as a cost only, you’re doing it wrong. In an online survey of 10,000 consumers conducted by Harris Poll for IBM in 2018, 75 percent of consumers said they would not buy a product from a company, no matter how much they liked the product, if they didn’t trust the company to protect their data. And, of online retailers who experienced an increase in online sales, 58% say enhanced security features had a very significant impact on their sales in the 2017 American Express Digital Payments Survey. So, in an age when the security and privacy of PII factors into buying decisions, tout the measures you have taken to protect the sensitive data of your customers, employees, board members and suppliers. Learn more here …

Filed Under: Uncategorized

Share:

Meet With Us!

Schedule an Online Meeting with Threatucation to start developing a Culture of Cyber Security in your organization.

Latest News

  • Cyber Security Tips for Protecting Law Firms March 31, 2021
  • Security Awareness not Just for Employees March 1, 2021
  • Cautionary Tales for SMBs from Hacked Water System February 17, 2021
  • Five Tips to Strengthen Security in Your Law Firm February 3, 2021

FOLLOW US

Contact Us

Form for requesting a free cyber security risk assessment.

Copyright © 2021 · Threatucation