{"id":1321,"date":"2015-02-05T18:54:56","date_gmt":"2015-02-05T18:54:56","guid":{"rendered":"https:\/\/tsisupport.com\/?p=366"},"modified":"2020-05-27T08:12:38","modified_gmt":"2020-05-27T08:12:38","slug":"cyber-readiness-what-is-it-and-why-you-need-it","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=1321","title":{"rendered":"Cyber Readiness \u2013 What Is It And Why You Need It"},"content":{"rendered":"<p>At the <strong>World Economic Forum<\/strong> in January John Chambers, CEO of <strong>Cisco Systems<\/strong>, <a href=\"http:\/\/fortune.com\/2015\/01\/23\/cyber-attack-insurance-lloyds\/\" target=\"_blank\" rel=\"noopener noreferrer\">predicted<\/a> that 2015 would be the worst year yet for cyber-attacks, following a year that saw attacks on <strong>Sony<\/strong>, <strong>Target<\/strong>, <strong>Home Depot<\/strong>,<strong> JP Morgan<\/strong>, and other large companies. In the wake of those major hacks, and Mr. Chambers\u2019 bold prediction, the term \u201c<strong>Cyber Readiness<\/strong>\u201d has been bandied about the media and offices alike. It\u2019s aiming to be one of 2015\u2019s biggest technology buzz words, but many individuals and companies aren\u2019t certain what \u2013 exactly \u2013 it means.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-865\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/1594411528_1512b1aad5_z.jpg\" alt=\"Cybersecurity\" width=\"640\" height=\"504\" \/><\/p>\n<p><strong><em>Cyber Readiness<\/em><\/strong> is, essentially, the process of integrating security measures across an entire system or infrastructure that continuously monitors not only threats, but incoming and outgoing activity across the network. In this way, the security rules set in place will monitor not only virus and corruption threats, but also protect against and detect any \u201chacking\u201d or data-breaching behaviors. They may also be able to monitor any type of activity within the network that could be deemed suspicious or in violation of company policy, such as transferring files to an external source, in the event that a hacker has made their way in \u2013 or worse \u2013 that the threat is more of an \u201cinside job.\u201d<\/p>\n<p>Although it may sound a bit \u201cBig Brother,\u201d having a comprehensive<strong> Cyber Readiness<\/strong> policy in place is essential to maintaining sound IT health and securing your company\u2019s assets, including the private data of your employees and clients\/customers.<\/p>\n<p>According to a study conducted by the<strong> <a href=\"http:\/\/www.nsba.biz\/wp-content\/uploads\/2013\/09\/Technology-Survey-2013.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">National Small Business Association<\/a><\/strong>, a cyber-attack costs, on average, nearly $9,000.00 for a small business \u2013 which is a big hit in losses for a company of any size, but especially to small businesses where budgets for IT and infrastructure may already be stretched thin. That number is also just an average; some companies may experience much larger losses, and enterprise-level companies could experience millions of dollars\u2019 worth of loss.<\/p>\n<p>At <strong>Technical Support International (TSI)<\/strong>, we\u2019re dedicated to providing our clients with the very best in IT security software and devices. We employ a staff of highly trained engineers who are constantly undergoing continuing education to achieve new competencies and certifications, and are ready to work with your company \u2013 either as an extension of your existing IT department or in place of it \u2013 to ensure that you\u2019re fully protected.<\/p>\n<p><em>To discuss your company\u2019s security needs and schedule an assessment, give us a call at (508) 543-6979.<\/em><\/p>\n<p>\u2014<\/p>\n<p>Sources:<\/p>\n<ul>\n<li><a href=\"http:\/\/www.mcafee.com\/us\/industry\/public-sector\/cyber-readiness.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.mcafee.com\/us\/industry\/public-sector\/cyber-readiness.aspx<\/a><\/li>\n<li><a href=\"http:\/\/www.nsba.biz\/wp-content\/uploads\/2013\/09\/Technology-Survey-2013.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.nsba.biz\/wp-content\/uploads\/2013\/09\/Technology-Survey-2013.pdf<\/a><\/li>\n<li><a href=\"http:\/\/fortune.com\/2015\/01\/23\/cyber-attack-insurance-lloyds\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/fortune.com\/2015\/01\/23\/cyber-attack-insurance-lloyds\/<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>At the World Economic Forum in January John Chambers, CEO of Cisco Systems, predicted that 2015 would be the worst year yet for cyber-attacks, following a year that saw attacks on Sony, Target, Home Depot, JP Morgan, and other large companies. In the wake of those major hacks, and Mr. Chambers\u2019 bold prediction, the term&hellip;<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Readiness \u2013 What Is It And Why You Need It - TSI Support<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Readiness \u2013 What Is It And Why You Need It - TSI Support\" \/>\n<meta property=\"og:description\" content=\"At the World Economic Forum in January John Chambers, CEO of Cisco Systems, predicted that 2015 would be the worst year yet for cyber-attacks, following a year that saw attacks on Sony, Target, Home Depot, JP Morgan, and other large companies. In the wake of those major hacks, and Mr. Chambers\u2019 bold prediction, the term&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=1321\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-05T18:54:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-27T08:12:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/1594411528_1512b1aad5_z.jpg\" \/>\n<meta name=\"author\" content=\"Brian Downey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brian Downey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1321\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1321\",\"name\":\"Cyber Readiness \u2013 What Is It And Why You Need It - TSI Support\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1321#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1321#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/1594411528_1512b1aad5_z.jpg\",\"datePublished\":\"2015-02-05T18:54:56+00:00\",\"dateModified\":\"2020-05-27T08:12:38+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c\"},\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1321#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=1321\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1321#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/1594411528_1512b1aad5_z.jpg\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/1594411528_1512b1aad5_z.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1321#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Readiness \u2013 What Is It And Why You Need It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c\",\"name\":\"Brian Downey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g\",\"caption\":\"Brian Downey\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=8\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Readiness \u2013 What Is It And Why You Need It - TSI Support","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cyber Readiness \u2013 What Is It And Why You Need It - TSI Support","og_description":"At the World Economic Forum in January John Chambers, CEO of Cisco Systems, predicted that 2015 would be the worst year yet for cyber-attacks, following a year that saw attacks on Sony, Target, Home Depot, JP Morgan, and other large companies. In the wake of those major hacks, and Mr. Chambers\u2019 bold prediction, the term&hellip;","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=1321","og_site_name":"TSI Support","article_published_time":"2015-02-05T18:54:56+00:00","article_modified_time":"2020-05-27T08:12:38+00:00","og_image":[{"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/1594411528_1512b1aad5_z.jpg"}],"author":"Brian Downey","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Brian Downey","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1321","url":"https:\/\/tsisupport.com\/tsistaging\/?p=1321","name":"Cyber Readiness \u2013 What Is It And Why You Need It - TSI Support","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1321#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1321#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/1594411528_1512b1aad5_z.jpg","datePublished":"2015-02-05T18:54:56+00:00","dateModified":"2020-05-27T08:12:38+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c"},"breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1321#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=1321"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1321#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/1594411528_1512b1aad5_z.jpg","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2015\/06\/1594411528_1512b1aad5_z.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1321#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Cyber Readiness \u2013 What Is It And Why You Need It"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c","name":"Brian Downey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g","caption":"Brian Downey"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=8"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1321"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1321"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1321\/revisions"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}