Most manufacturing companies operate lean, and luckily; our agency was started by someone with an extensive background in both software and electronics manufacturing. Unlike the marketing agencies of the Mad Men era, new-age agencies are built to do more with less.Read More
Below is a guest post from Tom Smith, VP of business development and strategy for CloudEntr by Gemalto. In this role, he helps define and execute Gemalto’s identity and access initiatives in the cloud. Tom has over 30 years of experience with security, mobile, and cloud technologies, including founding executive roles at four technology companies. Read more on how to keep your agency’s data secure though two-factor authentication and password management here.
When you think of all the things that drew you to the marketing and advertising industry, information security probably doesn’t spring to mind. It likely didn’t even occur to you that dealing with clients’ strategies could make you responsible for handling sought-after secrets.
Yet look at how government leaks have happened. NSA servers weren’t hacked. Contractors like HBGary Federal and General Dynamics that work on government projects were targeted. This means you—a third-party vendor—could be at risk. Should confidential client files be leaked, you could be subject to the subsequent investigation.
If you want to land big accounts, you need to prove that you’re not a weak link. Agency collaboration is difficult without sharing access to online services, but you can do so securely with these four practices.Read More