Entries by kaizen78

Richard A. Tait Named Chief Operating Officer (COO)

Kaizen Approach, Inc. (KAI) a leading provider of comprehensive IT, Cybersecurity, and Learning and Development solutions, announces the appointment of Richard A. Tait to Chief Operating Officer (COO).

“I am pleased to announce Richard’s promotion as he has demonstrated the leadership, commitment and vision to serve in his new capacity,” said Al Pickering, Kaizen Approach, Inc.’s founder and chief executive officer. 

Kaizen Approach, Inc. Awarded Five-Year IT Support Contract

Kaizen Approach, Inc., a service disabled veteran owned small business (SDVOSB), has been awarded a five-year Prime contract for the Department of Defense. The contract is for learning support services, including assessment services, survey services, human performance improvement services,  and workforce development services. 

Building Management Systems and Cybersecurity: The Internet of Things comes to Facilities Management

Whether you work or live in a professionally managed building, one normally doesn’t give much thought to how secure the building is, aside from good locks, security guards and fire alarms/sprinklers. However, our residences and workplaces should address cybersecurity issues as well, as the IT systems managing environmental and electrical systems are susceptible to attack. […]

Kaizen Approach, Inc. Awarded Five Year IT Support Contract

Kaizen Approach, Inc., a service disabled veteran owned small business (SDVOSB), has been awarded a five year Prime contract for the Department of Defense. The contract is for IT support for learning solutions. Kaizen heads a team of seven companies to add value to the Intelligence Communities training and learning solutions.

Consider Tokenization to Secure Sensitive Data

With the rising number of security breaches and hacks, it is better to avoid losses by identifying and protecting sensitive data from exposure Tokenization is defined as substituting a sensitive data element with a non-sensitive equivalent (token) that has no extrinsic or exploitable meaning or value. The token must bear no resemblance to the data […]

Small Business Banking: Protecting Your Money from Hackers

What if you checked your business banking account and found it seriously depleted, with thousands of dollars missing? Call your bank? Query your employees? Call the police?  You could do all the above but it is most likely that the bank will report that the money was wired from your business banking account using your […]

OPM Breach: Protecting Yourself from the Fallout

Everyone has heard about the massive breach of 21.5 million identities stolen from the Office of Personnel Management in an attack that was revealed in June of 2015. Any person who underwent a security clearance would be in the OPM database. The sensitivity of the information is immense as it contains personal information commonly used […]