November 21, 2018

IT specialist Prieur Leary knows that one of the most common threats faced by Information Technology (IT) specialists comes when ex-employees are able to continue to access systems after termination because the internal systems are not always kept up to date. That means former employees have access to and the ability to disclose sensitive information that those outside the organization should not have. That is why Prieur Leary will do everything possible to make sure all systems in his care are as up-to-date and as safe as possible.
Cybersecurity seems to be a greater priority for Prieur Leary than it is for many other information technology (IT) specialists, in part because he also serves as a financial advisor for a great many clients. Put simply, if he becomes careless in that part of his IT duties, it could cost clients a lot of money and security. Since his primary mission in the financial industry is to increase his clients’ wealth, if he failed at keeping information secure, that would breach that mission to a significant degree.

IT specialist Prieur Leary knows that one of the most common threats faced by Information Technology (IT) specialists comes when ex-employees are able to continue to access systems after termination because the internal systems are not always kept up to date. That means former employees have access to and the ability to disclose sensitive information that those outside the organization should not have. That is why Prieur Leary will do everything possible to make sure all systems in his care are as up-to-date and as safe as possible.
Cybersecurity seems to be a greater priority for Prieur Leary than it is for many other information technology (IT) specialists, in part because he also serves as a financial advisor for a great many clients. Put simply, if he becomes careless in that part of his IT duties, it could cost clients a lot of money and security. Since his primary mission in the financial industry is to increase his clients’ wealth, if he failed at keeping information secure, that would breach that mission to a significant degree.