This is the final installment of our cybersecurity series. To catch up on our story, click here. The traffic back to the office was, of course, bad. Tom thought, “It's 11 o’clock! Why?” Sitting in a traffic jam on I-35, Tom thought he might as well make his time useful. He had cyber consultants, and the phone number was in his phone. This was a breach, and he did not know how it happened. Each gap between rings took forever. A familiar voice picked up the phone, “Hi, this is
To catch up on our story, click here. Like any other morning, Tom got ready for work and tried to get to the office before Rebecca, but like every morning he didn’t. He did notice when he pulled into his parking spot and turned on his phone that he had several voicemails. “That’s odd,” he thought, “it's not even 9 o’clock yet. I’ll check them at my desk.” Walking in the door, Rebecca wasn’t there, but he heard several voices in the back office. Danny and Rebecca were there on
To catch up on our story, click here. Tom only got through about half of the emails he wanted to. “Of course!” Tom kicked himself. Like every other day, it was already lunch hour out of the blue. Instead of lunch, Tom decided to send the due diligence files to Susan. During the meeting with the Bakers, the discussion deviated to oil and gas investments. Though not popular now, there was a convincing argument to diversify, enough to email them a brochure and schedule a follow
“Morning, Rebecca,” Tom said as he walked into his business. “Mornin’, Tom. How was Houston?” she asked with a classic smile. “Great clients! Horrible traffic.” “I hear you there, sir! That’s why I call Dallas home.” “Is Susan in? I need some advice. Holler at me when she comes in.” Tom said. “Now, I really need to get to that backlog of emails.” Tom was in Houston for most of the week and was in non-stop meetings with an oil and gas firm, a real estate investment trust and a
Need more details? Contact us
We are here to assist. Contact us by phone, email or via our social media channels.