Since 1995, Mike has served as President, Vice President of Marketing & Sales, Director of Professional Services,and Consultant for PaperClip Incorporated. In his current role, he is responsible for strategic direction,operations, and corporate communications. Prior to joining PaperClip Software, Mike was the Executive Vice President and co-founder of CMF Design System, a custom software and systems integration firm. Mike received a Bachelor of Science from Rowan University and served as a Captain in the United States Marine Corps.

 

 


Jan 14, 2014
Mike Bridges

I'm here to tell you that all good cyber security strategies begin with a plan.

The frequency of online attacks against U.S. business continues to increase, along with the cost of defending against those attacks and
mitigating any resulting data breaches. Cyber-crime now costs a U.S. business $8.9 million per year, an increase of 6% from 2011 and 38% from 2010. Those findings come from the “2012 Cost of Cyber Crime Study,” which was sponsored by security intelligence tool vendor HP and released Monday (10/8/2012) by Ponemom Institute.

Oct 17, 2013
Mike Bridges

As we continue to talk about cyber security plans, we have to talk about The Red Flag Rule, which requires many businesses to develop and implement a formal, written Identity Theft Prevention Program for the purposes of detecting the warning signs, or "red flags", of identity theft throughout their day-to-day operations. Here’s what else you need to know:

Oct 07, 2013
Mike Bridges

As we continue to talk about creating a cyber security plan, we have to touch on infrastructure and systems management.The potential privacy impact is assessed when new processes involving personal information are implemented, and when changes are made to such processes (including any such activities outsourced to third parties or contractors), and personal information continues to be protected in accordance with the privacy policies. For this purpose, processes involving personal information include the design, acquisition, development, implementation, configuration, modification and management of the following:

Sep 24, 2013
Mike Bridges

Do you have a plan to combat cyber threats? If you don’t, you need one. And any good plan should include assigning responsibility and accountability for system security. What should this cyber security expert do? Here’s some tips:

Need Support?
helpdesk@paperclip.com
Phone:
1-800-929-3503
1-201-881-1299
Need Sales?
contactus@paperclip.com

web seal SOC2T2 145

CSA

Back to top