The Relationship: Why Technology Is Only One Part of the Equation



Relationship: Loyalty, Integrity and Trust


It’s no surprise that the business environment has dynamically changed in recent years. Technology has become a major factor in every facet of our lives. Individuals can now take conference calls from their cars, schedule next week’s dinner while on the go and book their next vacation in seconds, all thanks to technology.


But technology often distracts us from what is most important. Whether I’m consulting on how to protect critical assets, having a discussion around cloud and mobile or speaking to the importance of optimizing a security program, my goal isn’t to project intelligence, knowledge or experience. Those traits are advantages, but not requirements.


There are three things that every person should look for when selecting their service provider: loyalty, integrity and trust.


Building Relationships Is Not a Part-Time Job


Countless organizations in the information technology industry spend a great amount of time on pre-sales, opportunity identification and product knowledge. They are constantly investing time and money to ensure their business processes are executed flawlessly and the sale happens quickly. However, in the security sector more than any other, building a relationship with clients cannot be a part-time job or an afterthought in this process.


I am entrusted every day to protect the financial information of my clients. I have a responsibility to protect the health data of the sick and the personally identifiable information of minors.


The blunt truth is that anybody with the right technology can protect data, but no one spends the time I spend creating and building that long-term relationship; for me, building that relationship is as important as the information I protect.


Protecting Your Organization’s Reputation


To be successful in information security, you have to invest to making relationship building and trust building a full-time job. Why? Because we are all stewards of different things: Bankers handle money; doctors impact health; teachers control education; parents raise children.


As business leaders, your employees and customers trust you. You are entrusted with their personal and financial information. Their way of life is dependent on how well you protect them.


As Warren Buffett once said, “It takes 20 years to build a reputation and five minutes to ruin it.” This is one of my favorite quotes from the chairman of Berkshire Hathaway. Unfortunately, while this quote is applicable to other industries, it does not apply to cybersecurity.


In the cybersecurity world, it doesn’t take five minutes to ruin your reputation. You can see it happening it real time as a cybercriminal compromises your customer’s information and your business ends up as a top headline in the news.


You cannot be fully committed to building relationships if you are not committed to earning the trust of your clients. The best way to earn that trust and begin to build that relationship is to ensure your organization has taken every measure to keep your client’s data safe.

Don’t wait until you are breached before taking action. Take it now and be proactive instead of reactive.


Three Types of Companies


In my opinion, there are three types of companies:

Companies that have been hacked;

Companies that are about to be hacked; and

Worst of all, companies that have been hacked and don’t know it yet.


When looking for a new financial service provider, hospital, bank, etc., I strongly advise my clients not to do business with them unless they have a cybersecurity program in place.

No security solution can guarantee 100 percent immunity from a cyber breach. But the organizations that have the technologies in place and an action plan to protect my business have a leg up on the competition. After all, if you can’t make an investment in protecting what is important to me, how can you say you are fully invested in our relationship?


**Note to reader: This post was originally published by Security Intelligence, Powered by IBM. https://securityintelligence.com/the-relationship-why-technology-is-only-one-part-of-the-equation/

0 views

© 2020 by KevinJoseph.com | Subscribe

Short New Logo.png
  • Grey LinkedIn Icon
  • Grey Twitter Icon