Managing Information Security Basics      
March, 2013

When you are fleeing a lion, it is not necessary to be faster than the lion, you just need to be faster than anyone else the lion is chasing. Technology evolves too quickly for the average professional to be 100% secure, but you can put up barriers that make you harder to hack than the next person, and that might just keep you smoothly sailing on the tidal wave of technology.

For this month's newsletter, we'd like to share some thoughts on internet security (and how NOT to be the slowest gazelle on the savannah).
Five Basic Steps to a More Secure Technological Environment

Small businesses often go about their days without the help of full-fledged information technology departments. Challenges are dealt with on an ad hoc basis, as problems arise, and individual employees are left to their own devices when it comes to securing company computers and important internal information.  


But there are many steps you, and your employees, can take to secure your data, even without the help of the IT geeks. The following are a few suggestions for creating a more secure technological environment for your business or organization... Read more  

Where is Most of Your Data? Try Your Pocket.

Any information security consultant will tell you that to protect your digital data you need to know what data you have. This is called a data inventory and it is a key part of corporate efforts to secure their technology environments. But individuals can, and should, do periodic data inventory assessments, too.


Surprisingly, personal data inventories often reveal that your greatest point of exposure is not on your computer at all, despite it having a 2 gigabyte hard drive. The biggest hole in personal information security is often in your pocket... Read more 

Information Security for Cities

Your city manager or staff is likely already aware of and has thought about the matter of information security. It is a growing concern within the government management ranks, and panels on information security take place at many professional conferences.  


But elected leaders also need to have a general sense of their city's information security practices so that council budget priorities can appropriately align with the needs of the municipality. A good first step is to examine the oversight and reporting structure for information security... Read more 

Two-Step Verification

One of the latest developments in online security, designed especially for those of us who tend to ignore online security, is called Two-Step Verification.  


At the most basic level, Two-Step Verification, also sometimes called Two-Factor Authentication, engages your cell phone to limit who can access your account. It's easy, free and highly effective.  


In a day and age when we almost all have our phones with us at all times, this is a great way to beef up online security... Read more

Prioritizing Information Security at Work

Between drumming up new business, completing the work you have in house and managing the people who work for you, there is not much time left in the day to plan a marketing strategy or create your latest blog entry, let alone evaluate your information security needs. But a secure computing enterprise is important to the long-term health of your organization, and setting up a security governance structure can help ensure information security gets the attention it needs... Read more  

Online security doesn't seem terribly important, until it suddenly and maddeningly does. If you need help with implementing any of these ideas, Tripepi Smith's technology practice is here to help. Taking some basic steps to protect yourself and your company now can do wonders for your peace of mind.

Ryder Todd Smith Signature 
Ryder Todd Smith
Tripepi Smith & Associates, Inc.

About Tripepi Smith
& Associates, Inc.

Tripepi Smith provides marketing, technology and public affairs solutions
for our clients. Whether you're redoing your website, driving an email campaign, evaluating your technology infrastructure or reaching out to local government, Tripepi Smith can help.

Connect with us

Talent on Tap
Dan Fenstermaker

Dan has extensive experience with video production for city governments, private corporations and sports programs.

His love affair with storytelling started in his early years and continues through to today. Dan also has a strong background in council meeting production work, supporting both the City of Placentia and City of Villa Park.

Dan's expertise takes him from directing through editing, giving him a holistic and efficient viewpoint on project execution for clients.

CBJ 159 

Civic Business Journal reports on the people, companies and solutions that make local government in California more effective.   


OC Board of Supervisors Joins ACC-OC 


Agoura Hills Chooses Sully-Miller Contracting Company 


ABM Wins Contract in Garden Grove 


RBF to Provide Environmental Impact Report for Nelles Project 

Click here to learn more about CBJ. 

Tripepi Smith & Associates, Inc.

PO Box 52152, Irvine, California 92619

Copyright � 2013. All Rights Reserved.