Relationship: Loyalty, Integrity and Trust

It’s no surprise that the business environment has dynamically changed in recent years. Technology has become a major factor in every facet of our lives. Individuals can now take conference calls from their cars, schedule next week’s dinner while on the go and book their next vacation in seconds, all thanks to technology.

But technology often distracts us from what is most important. Whether I’m consulting on how to protect critical assets, having a discussion around cloud and mobile or speaking to the importance of optimizing a security program, my goal isn’t to project intelligence, knowledge or experience. Those traits are advantages, but not requirements.

There are three things that every person should look for when selecting their service provider: loyalty, integrity and trust.

Building Relationships Is Not a Part-Time Job

Countless organizations in the information technology industry spend a great amount of time on pre-sales, opportunity identification and product knowledge. They are constantly investing time and money to ensure their business processes are executed flawlessly and the sale happens quickly. However, in the security sector more than any other, building a relationship with clients cannot be a part-time job or an afterthought in this process.

I am entrusted every day to protect the financial information of my clients. I have a responsibility to protect the health data of the sick and the personally identifiable information of minors.

The blunt truth is that anybody with the right technology can protect data, but no one spends the time I spend creating and building that long-term relationship; for me, building that relationship is as important as the information I protect.

Protecting Your Organization’s Reputation

To be successful in information security, you have to invest to making relationship building and trust building a full-time job. Why? Because we are all stewards of different things: Bankers handle money; doctors impact health; teachers control education; parents raise children.

As business leaders, your employees and customers trust you. You are entrusted with their personal and financial information. Their way of life is dependent on how well you protect them.

As Warren Buffett once said, “It takes 20 years to build a reputation and five minutes to ruin it.” This is one of my favorite quotes from the chairman of Berkshire Hathaway. Unfortunately, while this quote is applicable to other industries, it does not apply to cybersecurity.

In the cybersecurity world, it doesn’t take five minutes to ruin your reputation. You can see it happening it real time as a cybercriminal compromises your customer’s information and your business ends up as a top headline in the news.

You cannot be fully committed to building relationships if you are not committed to earning the trust of your clients. The best way to earn that trust and begin to build that relationship is to ensure your organization has taken every measure to keep your client’s data safe.

Don’t wait until you are breached before taking action. Take it now and be proactive instead of reactive.

Three Types of Companies

In my opinion, there are three types of companies:

  1. Companies that have been hacked;
  2. Companies that are about to be hacked; and
  3. Worst of all, companies that have been hacked and don’t know it yet.

When looking for a new financial service provider, hospital, bank, etc., I strongly advise my clients not to do business with them unless they have a cybersecurity program in place.

No security solution can guarantee 100 percent immunity from a cyber breach. But the organizations that have the technologies in place and an action plan to protect my business have a leg up on the competition. After all, if you can’t make an investment in protecting what is important to me, how can you say you are fully invested in our relationship?

More from CISO

Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

5 min read - No one needs to tell you that data breaches are costly. That data has been quantified and the numbers are staggering. In fact, the IBM Security Cost of a Data Breach estimates that the average cost of a data breach in 2022 was $4.35 million, with 83% of organizations experiencing one or more security incidents. But what’s talked about less often (and we think should be talked about more) is how communication — both good and bad — factors into…

5 min read

Ransomware Renaissance 2023: The Definitive Guide to Stay Safer

2 min read - Ransomware is experiencing a renaissance in 2023, with some cybersecurity firms reporting over 400 attacks in the month of March alone. And it shouldn’t be a surprise: the 2023 X-Force Threat Intelligence Index found backdoor deployments — malware providing remote access — as the top attacker action in 2022, and aptly predicted 2022’s backdoor failures would become 2023’s ransomware crisis. Compounding the problem is the industrialization of the cybercrime ecosystem, enabling adversaries to complete more attacks, faster. Over the last…

2 min read

Do You Really Need a CISO?

2 min read - Cybersecurity has never been more challenging or vital. Every organization needs strong leadership on cybersecurity policy, procurement and execution — such as a CISO, or chief information security officer. A CISO is a senior executive in charge of an organization’s information, cyber and technology security. CISOs need a complete understanding of cybersecurity as well as the business, the board, the C-suite and how to speak in the language of senior leadership. It’s a changing role in a changing world. But…

2 min read

What “Beginner” Skills do Security Leaders Need to Refresh?

4 min read - The chief information security officer (CISO) was once a highly technical role primarily focused on security. But now, the role is evolving. Modern security leaders must work across divisions to secure technology and help meet business objectives. To stay relevant, the CISO must have a broad range of skills to maintain adequate security and collaborate with teams of varying technical expertise. Learning is essential to simply keep pace in security. In a CISO Series podcast, Skillsoft CISO Okey Obudulu recently said,…

4 min read