Effective Solutions Through Partnership

Category Archives: Information Security

Equifax Data Breach: Next Steps

Cyber Security, Information Security, Information Security Management System (ISMS), Information Technology, ISO27001, KAI Partners, Ransomware, Sacramento, Small Business, Startup Company, Technology

As you may have heard, there has been a major breach of data at credit bureau Equifax.

It’s now more important than ever to protect yourself. To check whether you were affected by this data breach, visit: https://www.equifaxsecurity2017.com/potential-impact/. It’s quick and easy—it took our staff less than a minute to check their status.

If you were compromised, check out this article on ways you can protect yourself:
http://money.cnn.com/2017/09/07/technology/business/equifax-data-breach/index.html?iid=EL

Remember, KAI Partners can help your organization assess its security protection through our small business information security risk assessments and Information Security Management System frameworks.

KAI Partners is Hiring!

Agile, Business Analysis, Certified ScrumMaster (CSM), Communications, Cyber Security, Hiring, Human Resources, Information Security, Information Technology, Issues and Risks, KAI Partners, Onboarding, Organizational Change Management (OCM), Project Management, Risk Assessment, Sacramento, Small Business, Technology, Training

KAI Partners is thrilled to announce we are once again expanding our stellar team! Interested in joining our growing company? Take a look at the following positions for which we are currently hiring!

Business Analyst
The seasoned, motivated, and client-focused Business Analyst should be a highly organized, self-directed, and engaged individual. The Business Analyst will be responsible for a diverse set of responsibilities including, but not limited to:

  • Requirement elicitation and facilitation
  • Business process improvement
  • Business process and narrative modeling
  • User testing
  • Training
  • Organizational change management and communication
  • Process standardization and improvement for ongoing operations

We are looking for four (4) Business Analysts who are enthusiastic problem-solvers who thrive on aligning the client’s business needs with technology solutions. Click here for more information or to apply for one of our on-site, Sacramento-based Business Analyst roles.

IT Audit Consultant
The seasoned, motivated, and client-focused contract IT Audit Consultant will engage with a number of stakeholders in client IT support infrastructures to ensure appropriate processes, procedures, and controls are adequately designed and implemented to meet key control requirements for clients, and will mitigate significant risks that clients deem appropriate. To be successful, the IT Audit Consultant should be a dedicated professional who possesses the analytical, feasibility, relationship, and executive IT audit skills needed to identify and test risk and control management strategies to meet various client requirements, along with compliance and regulatory requirements. The IT Audit Consultant will be responsible for providing IT risk management advice and control solution alternatives as the client needs.

The IT Audit Consultant can be based from anywhere in the U.S., but must have a valid U.S. passport and the ability to travel. Click here or for more information or to apply for the IT Audit Consultant role.

IV&V (Independent Verification & Validation) Consultant
The experienced, motivated, and flexible IV&V Consultant will be an enthusiastic problem-solver who thrives in a fast-paced environment. The IV&V Consultant will be responsible for performing IV&V assessments including, but not limited to:

  • Quality Management
  • Training
  • Requirements Management
  • Operating Environment
  • Development Environment
  • Software Development
  • Systems and Acceptance Testing
  • Data Management
  • Operation Oversight
  • Assessing Program risks

Click here for more information or to apply for the on-site, Sacramento-based IV&V Consultant role.

Scrum Master
The Scrum Master should have experience setting up teams for successful delivery by removing obstacles, constantly helping the team to become more self-organizing, and enabling the work the team does rather than imposing how the work is done. The Scrum Master will manage one or more agile projects, typically to deliver a specific product or transformation via a multi-disciplinary, high-skilled digital team. Adept at delivering complex digital projects, breaking down barriers to the team, and both planning at a higher level and getting into the detail to make things happen when needed, the Scrum Master will define project needs and feed the needs into the portfolio/program process to enable resources to be appropriately allocated.

Click here for more information or to apply for the on-site, Sacramento-based Scrum Master role.

Senior Technical Lead

The experienced, motivated, and flexible Senior Technical Lead should be an enthusiastic problem-solver who thrives on aligning business needs with the technology solutions. The Senior Technical Lead will work with a team of people to deliver the following tasks:

  • Task Accomplishment Plan (TAP)
  • TAP updates
  • Monthly written status reports
  • Requirements Management Plan
  • Project Schedule
  • Weekly Project Schedule Updates
  • Conduct JAD sessions
  • Code Assessment
  • Documentation Review and Assessment
  • Process Analysis
  • Data Analysis
  • Validate Requirements
  • Business Rules Extraction and Analysis
  • Knowledge Transfer

Click here for more information or to apply for the on-site, Sacramento-based Senior Technical Lead role.

Systems Analyst

The experienced, motivated, and flexible Systems Analyst should be an enthusiastic problem-solver who thrives in a fast-paced environment and has SharePoint experience. Some responsibilities of the Systems Analyst include, but are not limited to:

  • Determining operational objectives by studying business functions; gathering information; evaluating output requirements and formats
  • Designing new computer programs by analyzing requirements; constructing workflow charts and diagrams; studying system capabilities; writing specifications
  • Improves systems by studying current practices; designing modifications.
  • Recommending controls by identifying problems; writing improved procedures
  • Defining project requirements by identifying project milestones, phases, and elements; forming project team; establishing project budget
  • Monitoring project progress by tracking activity; resolving problems; publishing progress reports; recommending actions

Click here for more information or to apply for the on-site, Sacramento-based Systems Analyst role.

Technical Lead

The experienced, motivated, and flexible Technical Lead should be an enthusiastic problem-solver who thrives on aligning business needs with the technology solutions. The Technical Lead will work with a team of people to deliver the following tasks:

  • Task Accomplishment Plan (TAP)
  • TAP updates
  • Monthly written status reports
  • Requirements Management Plan
  • Project Schedule
  • Weekly Project Schedule Updates
  • Conduct JAD sessions
  • Code Assessment
  • Documentation Review and Assessment
  • Process Analysis
  • Data Analysis
  • Validate Requirements
  • Business Rules Extraction and Analysis
  • Knowledge Transfer

We are looking for three (3) Technical Leads. Click here for more information or to apply for one of our on-site, Sacramento-based Technical Lead roles.

We look forward to receiving your application today!

3 Top Cyber Security Infographics

Best Practices, Cyber Security, Infographic, Information Security, Information Security Management System (ISMS), Information Technology, National Cyber Security Awareness Month, Ransomware, Risk Assessment, Small Business, Technology

October is National Cyber Security Awareness Month! While we think cyber security should be at the forefront of everyone’s minds every day, we are glad to see a month dedicated to all things security. To help you be aware of the best insight and advice on this subject, we’ve rounded up some great infographics from around the Internet to share with you today. Take a look at these infographics to make sure you are applying the most up-to-date best practices to protect you and your business.

Remember, KAI Partners can help you to identify gaps in your security efforts. Email us at info@kaipartners.com to address and help minimize your cyber security risks.

Via Stay Safe Online (National Cyber Security Alliance)

 

Via Digital Guardian

 

Via Trend Micro

Ransomware Rescue Plan [INFOGRAPHIC]

Best Practices, Cyber Security, Infographic, Information Security, Information Technology, Ransomware, Technology

A few weeks ago we shared some news and tips on protecting yourself and your business against ransomware. We also wanted to share this infographic from Trend Micro, which breaks down ransomware–its history, how it works, and how to protect against it–in an easily-digestible way.

Via: Trend Micro

Best of the Best Practices: Round 2

Best Practices, Communications, General Life/Work, Healthcare, Human Resources, Information Security, Onboarding, Technology, Training

Best of the Best

By Sarah Walsh

It’s that time again! We’re sharing with you the best of the best practices that we’ve found around the Internet recently. Get up to speed on some of these newest trends to make sure you are continuously improving.

3 Training and Onboarding Best Practices from Bloomfire
The process of onboarding can always be improved—these best practices are worth trying out the next time you have employees to onboard.

Nine best practices in healthcare IT governance from Modern Medicine Network
The latest and greatest tips on ensuring your healthcare operation’s “leadership, organizational structures and processes to ensure that the organization’s IT sustains and extends the organization’s strategies and objectives” are up-to-date.

Internal Communications Best Practices [INFOGRAPHIC] from KAI Partners, Inc.
A shameless plug, sure, but these basic, yet necessary communications tools are good reminders the next time you communicate with a supervisor, colleague, or employee (so, within the next 5 minutes?)

Best Practices for Securing Your Organizations from Internal Data Breaches from WinMagic
Protecting your business against data breaches is a must. Start with these quick tips and then remember, KAI Partners can help you build an information security plan. Just contact us at info@kaipartners.com.

15 Ways to Stay Productive Over the Summer from Grammarly
As summer nears its end (say it isn’t so!) these best practices can help you stay on track to make sure you continue to be productive these last weeks of summer.

What are some of your best favorite practices? Share them with us in the comments!

About the Author: Sarah Walsh has nearly a decade of communications experience, including public sector roles in the California State Senate and State Assembly, as well as private sector roles for a sovereign Native American tribe and a global pharmaceutical company. In addition to communications work, Sarah and her husband are team captains and fundraisers for the National Multiple Sclerosis Society’s annual Walk MS event. When she’s not writing, editing, or soliciting her friends and family for MS Walk donations, she loves performing improv, hanging out with her husband and 5-year-old daughter, and cooking. Follow Sarah on Twitter @sarahsykeswalsh.

next page »