I know, I knowâ€¦ all work and no play. I can tell when Iâ€™ve been away from podcasting for a few days (okay, weeks) when I start getting polite emails and nudgesâ€¦ well, here is a quick audio update for you.
If youâ€™ve been following this site for a while, you may recall that I took some time at the turn of the year to think and plan how to be more effective in my business, as a blogger and as a podcaster. As a result of that planning (and my quest to regain some harmony in my life), we dedicated the entire month of January, and now some of February to documenting our approach, value and explaining our focus: to create, design and deliver exceptional experiences that help transform how organizations think about and protect information.
As a result, I am excited. I am healthy. And I am ready to get back behind the mic. Of course, I need to make sure that we keep my team healthy, active and busyâ€¦ but as that is coming more clearly into focus, Iâ€™ll have more time to get back to active podcasting.
In this update:
The 5 Steps to protecting your computer
Here are the five basic steps that anyone with a computer should be following
1. Update your operating system and applications
2. Use a non-admin account for general use
3. Install, configure and use anti-virus, anti-spyware and other malware protections
4. Install, configure and use a firewall
5. Backup, backup, backup
Each of the next five episodes will cover each of those steps, exploring the how and why in a way that we can share with technical and non-technical people alike. Then weâ€™ll produce two additional programs to cover basic wireless configuration and some additional tips from the pros.
Our Awareness Experiences and Efforts
In this update, I briefly mentioned that I am focusing on providing two exceptional experiences and a new way to handle security awareness
Speaking about Security
This two-day intensive experience is designed to explore the power of the narrative and teach professionals how to communicate about security concepts more effectively. Currently available as private classes; we are looking into holding some public courses.
Avoiding the Breach
Based on the research and prescription for success from my upcoming book, this two-day experience is an entertaining and proven approach to transforming how technical and non-technical people in your organization think about and protect information. Currently available as private classes; we are looking into holding some public courses.
Security Awareness Transformation
This is an exciting offering where we are combining the power of social media with our proven ability to connect with users with strategies to better protect themselves and their information (as well as yours).
For each of these, I will be sharing key concepts, lessons and strategies over the coming year. Iâ€™m interested in taking an approach of sharing the information so we all benefit, and then working with companies that are interested in being supported through their transformation. If you want some information in the meantime, shoot me an email. I’m excited about these areas and always interested to share some energy, passion and insight.
Iâ€™m currently looking for five (5) companies to work with me on each of these experiences to help validate some changes and approaches. If you are interested, please contact me and we can talk about some incentives I am currently offering to those interested in making an impact in 2007 – email@example.com
My approach to podcasting for 2007
We will share our research, knowledge, insights and work to provide you with insights, information, facts and templates to be more effective. Iâ€™ve also already announced some new programming weâ€™re starting this yearâ€¦ but donâ€™t worry, Iâ€™ll continue, when possible, to release some shorter podcasts that capture my thinking, my passion and help to get it out.
If you want to help: firstname.lastname@example.org
More to come soonâ€¦