Secure Remote Access isn’t a nice-to-have; it’s a must-have for today’s remote workers. This article discusses some of the more common types of remote vulnerabilties companies face, and how the use of Zero Trust-based Remote Access tools and policies can help secure your systems from hackers.
Tag: chris souther
Policies
Click on the image to view the policy. Social Media Policy Crisis Communications Plan
Social Media
I managed social media for both IBM and Verifone. Some screenshots from both shown below. IBM Security Social These statistics are from approximately 2010. At the time, this was considered a good following for B2B brands. Verifone Social Below are some trends on my Verifone Twitter account in March, 2012. A snapshot from SproutSocial. At… Continue reading Social Media
Address the Threat – Blog Post

My EMV Education – Blog Post

This is a blog written by Chris Souther. It was written very soon after Visa announced bringing EMV (aka, Chip and Pin) to the U.S.
Email Invite for Webinar
Chris Souther B2B writing sample – Email Invite for a webinar.
Low-Code Vendor Claims Another Victory with Citizen Developers at Major Insurance Company
Chris Souther B2B writing sample of a case study for application development.
Major Financial Services Company Solves Scalability Challenges with Low-Code Development
Chris Souther B2B writing sample of a Case Study for application development.
Embracing modern web design in Salesforce Experience Cloud.
Chris Souther B2B writing sample of a blog for application development.
eBooks
Chris Souther B2B writing samples of eBooks for application development.