Hero | he·ro : (n) a person who is admired or idealized for courage, outstanding achievements, or noble qualities.

A Visionary hero: a person, using the Visionary 360 methodologies, who has taken their company to new boundaries and achievements.

Gallery

Contact

+1(818) 459-3950

9018 Balboa Blvd. #563, Northridge, CA 91325

Contact Us

Channel member shares new Cybersecurity book

From Wikipedia.comComputer
security
cybersecurity[1] or information technology security (IT security) is the protection of computer systems and networks from the theft of or damage to their hardwaresoftware, or electronic data, as well as from the disruption or misdirection of the services they provide.

Security in the world of IT seems like a cartoon where the cat chases the mouse, a never-ending saga.  Team IT whacks a hacker, the hackers get smarter and circles back to Team IT.  Sound familiar in your daily realm of activities?

A few years ago while attending an HTG group function, (Yes, this is back in the day when I still was an owner of a managed service provider firm) I was introduced to a newly employed team member of US Computer Connection, Marlon Bermudez.  My gut told me there was special about Marlon, and years later I would be proven  correct.  Marlon reached out to me advising he just finished writing a book on Cybersecurity and wanted to know if I could review it.  I have kept in touch with Marlon after selling my firm, and was delighted to see his accomplishment, so I did a quick interview with Marlon to see what prompted him to write this book.

Why did you write it?

Due to a lack of resources, budget, and awareness of Cybersecurity as a business risk, small and midsize organizations may not be prepared to survive the impact of a data breach. I wrote this book to help give them a fighting chance. 

Who is the intended audience?

The book is helpful to anyone in the organization. From business owners, partners, managers, compliance officers, to end-users.  Since Cybersecurity is everyone’s responsibility, this book aims to help everyone learn how to protect the organization. 

What are the key factors that one will learn from reading this book?

The book explains in simple terms:

How cybercriminals target your organization and employees

How readers can protect their organization

An overview of the NIST Cybersecurity Framework, which is expanded upon in this book

Legal and regulatory compliance that may be applicable to organizations

Creating a Cybersecurity Business profile, Asset management, Risk Management, and more. 

The book covers the categories and 108 subcategories of the NIST Cybersecurity Framework while providing a simple explanation of the concepts, links, sample products and solutions, and self-assessments.  

Where can they get this book? 

The Book is available on https://www.amazon.com/gp/product/B08CJZCJ79 in both eBook and Paperback format. The eBook will be available for free August 23-27 as a contribution to Small and Midsize Businesses, to help them obtain access to this valuable resource.

Author note:  The Kindle version is only$2.99.

What do you do in life that makes you a subject expert on this book?   

I have been helping small and midsize businesses with their IT needs for over 14 years, during which I have been the devastating impact cybersecurity incidents and breaches have on unprepared organizations.  Throughout my career, I have obtained over 17 IT-related certifications, and several Information Security ones like Security+, CISSP,  and CISM.  Simultaneously, I obtained a Masters in Cybersecurity in 2017. This book is the result of my passion for cybersecurity, continuously learning, extensive research, and based on real-life observations of unprepared organizations who have faced the devastating impact of cybersecurity incidents or data breaches. 

I wrote this book to promote cybersecurity and to empower organizations to improve their cybersecurity posture and enable them to prepare to survive a data breach.

Has one of your team members created or done something extraordinary?  Tell us about it by submitting your suggestion 
here.

 

About Marlon Bermudez:

Marlon is Vice President of Information Security at US Computer Connection of Stamford, CT.

Reach him on LinkedIn

The eBook will be available for free until Thursday August 27, 2020

Share this article on social media

About Visionary 360

Visionary 360 comprises seasoned coaches specializing in the technology sector, particularly IT Service Providers, to enhance tool implementation with a financial focus.

As problem solvers who relish challenges, we delight in assisting individuals while enjoying the journey. Our client relationships are familial, and we take pride in witnessing their companies thrive. Witnessing our clients prosper is our greatest reward. To learn more about Visionary 360, visit our website at visionary360.com or schedule an introductory meeting to discuss your needs.

Have a Blog idea?

We would love to hear about it!

Sign Up for Notifications

Want notifications for new blog posts?

Like Us