LEARNING OUTCOMES
  • Accepting the ways your employees will use your equipment
  • Protecting your company from malicious things that happen without malicious intent
  • Staying up to date on ever-changing requirements
Signature

Everyone Has Porn on Their Computers: How to Protect Your Company From Your [Non-Malicious] Employees

Do your employees have porn on their company computers? Yes. Get over it. They likely also have a boatload of
random apps and maybe their kid’s homework.

The reality is that, even in the strictest environments, business computers very rarely get used only for business purposes.
And there’s very little you can do about it.

Even your best employee is going to use the hardware you give them in ways you never intended. What does that actually
mean for your bottom line? In the best-case scenario, it means absolutely nothing. You have a happy employee who can use
the equipment as they need to, and they’re feeling supported and everything’s great. In the worst-case scenario, however they visit a pornography site, where they get a nasty virus. And when they VPN into your network, they infect all your databases, all your customer records, all the other machines on your network.

I’ll start with the premise that your people are going to use stuff in inappropriate ways. Then I’ll tell you how to make sure
that doesn’t take down your business. There are things you can do, from very inexpensive and ineffective, to very
expensive and ineffective, to very expensive and very effective. I’ll discuss them all, so you can make sure you are making
the right choices for the reality of your business — now and later.

Get the Info Sheet

Other Popular Keynotes

Compliance & Regulations

Their Data is Your Reputation: Playing Nice with the FTC

Gramm-Leach-Bliley. Gold star if you know it requires companies to protect consumer data. There are some serious fines, and new rule changes that likely impact your business and are going to make HIPAA look like a cakewalk.

Get the Info Sheet

Signature

Cybersecurity is Everyone’s Responsibility

You started your business because you liked doing what you do, not because you liked doing the business part of the business. So while you’re not thinking about cybersecurity, other people are thinking about how to take advantage of you.

Get the Info Sheet

Signature

Data Integrity: The True Currency of Cybersecurity

Data integrity isn’t just a technical issue—it’s the foundation of trust with your clients, your partners, and your entire operation. In a world where cyber threats are targeting not just data theft but data corruption, organizations face a hidden risk that can undermine their reputation and their bottom line.

Live Speaking Event

Bespoke Talks

Collaborate with Howard to design an individualized program tailored to your organization.

One of the most entertaining and engaging talks we’ve ever had. Not only did Howard leave our audience with takeaways they could instantly apply to their business, many of them asked when we could have him back again as a speaker.

Kim Walsh Phillips

CEO Powerful Professionals and Keynote Speaker

Booking & Inquiries

Interested in inviting Howard to speaker at your next event?
Provide your event details below, and we’ll be in touch with you shortly.

Name