portfolio · portfolio cindy tschosik founder & content writer ghost wri1ng content marke1ng...

15
PORTFOLIO Cindy Tschosik Founder & Content Writer Ghost Wri1ng Content Marke1ng Website Content Technical Documenta1on [email protected] (630) 926-8756 www.SoconnectedLLC.com 2

Upload: others

Post on 09-Aug-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PORTFOLIO · PORTFOLIO Cindy Tschosik Founder & Content Writer Ghost Wri1ng Content Marke1ng Website Content Technical Documentaon Cindy@SoconnectedLLC.com (630) 926-8756

PORTFOLIO

CindyTschosikFounder&ContentWriter

GhostWri1ngContentMarke1ngWebsiteContent

TechnicalDocumenta1on

[email protected] (630)926-8756 www.SoconnectedLLC.com2

Page 2: PORTFOLIO · PORTFOLIO Cindy Tschosik Founder & Content Writer Ghost Wri1ng Content Marke1ng Website Content Technical Documentaon Cindy@SoconnectedLLC.com (630) 926-8756

Yourstoryismymission.Mymissionistodefineanddesignyourstory,yourvoice,yourmessagewithyourcustomers.WithastrongandsuccessfulbackgroundinParalegal,ITandMarke1ngovera20+yearspan,IfoundedSoConnectedbecauseitallowsmetoblendmyfavoriteandstrongestskillsets.Thecrea1veaspectsofwri1ng,strategicplanning,technicalanalysisfiresupmysenses!MySecretSauce.Rela1onshipsS1llMaLer.Beforetheinternet,mobilephones,tex1ngandsocialmedia,ourrela1onshipsor‘socialnetworks’werefacetofaceoronthephone.Today,itisdifferent,butwhathasn’tchanged,isthefactthateveryonewantstoconnect.Mydiscoveryprocessistocloselyconnectwithyou,myclient,togettoknowyou,yourstory,yourcompany,goals,mission,service,products,soIcandefineyourvoice,notmine.Results.One…Two…Three…Cut!That’sallthe1meyouhavetograbtheaLen1onofyouraudiencethroughcontent–wriLenorvisual.Yourmessagingandimagesneedtoelicitemo1on,interestandengagementwithin3-7seconds.Together,wewillshowcaseyourcompanytotheworldwithin3-7seconds!Growingauthen1crela1onshipswithyourconsistentconnec1onsandmessagingisthekeytostayconnectedwithyourprospectsandcustomers.IlovewhatIdo.IamaMidwesterngalbornandraised,mom,wife,friend,founderofSoConnectedandanorganiccrea1vecontentconnectorwholovesagreatstory,operatesatthehighestlevelofintegrityandisfocusedonyou!Nextinline,aZermyhusbandandchildrenmyloveiswri1ng.Letmyloveforwri1nghelpyoushareyourpersonalORprofessionalstory.

FOURFASTFACTSABOUTCINDYTSCHOSIK

SoConnectedismorethananame.It’showwedobusiness.Wearedis1nguishedbecauseoursecretsauceisourrela1onshipwithyou.Wecloselyconnectwithyou,ourclient,tolearnaboutyou,yourmission,yourgoals,yourobjec1vesandyourbusiness.Throughourdiscoveryprocess,yourvoiceisrevealed,notours.Ourcontenteffec1velyconnectsandengageswithyourcustomers.Furthermore,thegreatestvaluewebringisaclearstrategicapproachtothepurpose,use,developmentanddistribuXonofyourmessaging.Andwedon'tstopthere.Wetakeitastepfurtherwithcontentanalysistobesureitreachesyourcustomersanddrivesthemtotakeac1on.Withover25yearsofwri1ng,strategicplanning,andcontentdistribu1on,SoConnectedisyourpartnertobuildyourbrandthroughcontentandgetyouSoConnectedtoyourcustomers.

ABOUTSOCONNECTED

Page 3: PORTFOLIO · PORTFOLIO Cindy Tschosik Founder & Content Writer Ghost Wri1ng Content Marke1ng Website Content Technical Documentaon Cindy@SoconnectedLLC.com (630) 926-8756

PublishedWorks

www.PowerfulPartnersInc.comwww.Authen1cLivingWellness.comwww.Fer1lityWellnessCoach.comww.AngieEngstrom.comwww.SoConnectedLLC.com

WebsiteContent,Layout&Naviga1on

Ar1clesDataSecurity:Internal&ExternalRiskFactors,Jan.2016PublishedhLps://creditunionbusiness.com/data-security-internal-external-risk-factors/

TwiLer&FacebookAdver1sing

HowtoPrepareforanIVFCycle,Aug.2015Publishedinwww.MyFer1litySpecialist.com,

Page 4: PORTFOLIO · PORTFOLIO Cindy Tschosik Founder & Content Writer Ghost Wri1ng Content Marke1ng Website Content Technical Documentaon Cindy@SoconnectedLLC.com (630) 926-8756

BrochureContent

Page 5: PORTFOLIO · PORTFOLIO Cindy Tschosik Founder & Content Writer Ghost Wri1ng Content Marke1ng Website Content Technical Documentaon Cindy@SoconnectedLLC.com (630) 926-8756

BrochureContent

Page 6: PORTFOLIO · PORTFOLIO Cindy Tschosik Founder & Content Writer Ghost Wri1ng Content Marke1ng Website Content Technical Documentaon Cindy@SoconnectedLLC.com (630) 926-8756

Before/AZerSample

CONTENTSAMPLE–COMMONWRITINGSBYALLOFUSORIGINALIprac1ceaholis1capproachtohealthandwellness,whichmeansthatIlookathowallareasofyourlifeareconnected.Doesstressatyourjoborinyourrela1onshipcauseyoutoovereat?Doeslackofsleeporlowenergypreventyoufromexercising?Asweworktogether,wewilllookathowallpartsofyourlifeaffectyourhealthasawhole.Myapproachisnottodwelloncalories,carbs,fats,andproteins.Itisnottocreatelistsofrestric1onsorgoodandbadfoods.Instead,Iworkwithmyclientstocreateahappy,healthylifeinawaythatisflexible,funandrewarding.Togetherwe’llworktoreachyourhealthgoalsinareassuchasachievingop1malweight,reducingfoodcravings,increasingsleep,andmaximizingenergy.Asweworktogether,you’lldevelopadeeperunderstandingofthefoodandlifestylechoicesthatworkbestforyouandimplementlas1ngchangesthatwillimproveyourenergy,balanceandhealth.FindingsCompanyFocusedDoesn’tcaptureaLen1onLotsofinforma1onthatisnotclear,conciseordirect.Informa1vecontent,butextracopythatdoesn’taddvalue.So,canbedeemedunnecessary.Doesn’tallowforaquickskim.Nocalltoac1on.REVISED(A)ORIGINAL.AUTHENTIC.POWERFUL.YOU. (B)Ahealthy,balancedlifeispossible,evenwithbusylives.AtALW,weworktogetherwithyoutohelpyoureachyourhealthgoalsinareassuchasweightmanagement,reducingfoodcravings,increasingthequalityofsleepandmaximizingenergy.Thedifference–youdrivethewheel.(C) Whatisimportanttoyou?Onceyourgoalsareestablished,wecustomizeahealthplantofityour

life,yourgoals,andyouraccomplishments.Theendgoal?Foryoutobecomeyouroriginal,authen1c,powerfulself.

(D)Steptowardalifeofwellnessthatareflexible,fun,andlong-las1ng.ScheduleyourchatwithJenniferCrossatCalendly.com.Thefirst50-minuteconsulta1oniscomplimentary.ResultsCustomerFocused,clear,concise,direct,crea1veandconsistentwiththerestofthemessaging.Audiencewantsahealthylife.(A)CaughtALen1onw/Heading(B)Provokedanemo1onwithimage(C)Elicitedaresponse(D)Demandedacalltoac1on

Page 7: PORTFOLIO · PORTFOLIO Cindy Tschosik Founder & Content Writer Ghost Wri1ng Content Marke1ng Website Content Technical Documentaon Cindy@SoconnectedLLC.com (630) 926-8756

TheFlowerWithinPublishedonClient’sWebsiteWhenmessagesorsymbolskeepshowingupinyourlife,paycloseaLen1on.Itistheuniversespeaking.AliLlegirlinMexicoyearnedtohelpherfamily.Outsideherbedroomwindow,grewaproduc1veandbeau1fulfigtree.Shegatheredfigswithgreatdelight.Shedaredtobedifferent,andinsteadofanordinarylemonadestand,shesetupafigstand.Everyonepassedby.Nosale.Withallhermight,shestartedrunningaZerherprospec1vecustomers.“Youmustbuythesefigs.Fiveforthreepesos.Youwon’tgetabeLerdeal,andyourfamilyneedsthem.”Attheendoftheday,ahappygirlreturnedhome30figslighter,and18pesosricher;asignificantamountforany5-yearoldgirlin1989.Thatsingleexperiencemarkedthestartofherfutureandsetherlifeinmo1on.LiLledidsheknowthenthegreatimportancethefigswouldofferherbeyondthatfirstdaybecauseeachsteptoeveryprospec1vecustomerelicitedpassion,discovery,wisdom,humility,persistence,vulnerability,vision,andawareness;theeightpillarsofastrongfounda1onthatwastoleadherthrougheverytrial,tribula1onandexulta1oninherlife.Withoutknowingitssignificance,XXXXXXfactorsbornthatdaysetthestoryinmo1onthatthewholeworldwouldhear.Manyofuswalkaroundwithamentalityofnega1vethoughtsaboutoursurroundings,ourday,andourselves.Why?Whatgoodisitdoing?ThatliLlegirlfoundtheposi1veinherfamilysitua1on,shewentouttohelpherfamily,andinturnhelpedmanymore.Bythatoneact,shehaschangedherpersonaloutlook,herfamily’soutlookandtheoutlookofeverynewcustomersheacquiredthatday.Howdidshedothat?Sheshoweduptoserve,actwithherheart,connecttopeople,andelevatethepeoplearoundherbybeingposi1ve,sharingherlight,hersmile,herenergy,andhergivingartude.Despitethefamily’shardship,shechosetheposi1veroute,foundthebeautywithinherselfandshareditwithothers.XXXXexplains,“Ridyourselfofbadmentality.Believe‘Iam150%complete.’Thinkposi1ve.Ifyouliveinasmallhouseanddreambigger,lovethathouse.Thankthathousebecauseitiswhereyourdreamsareplanted.Whenyousprinklegra1tudeandposi1vitywiththosesurroundingyou,youreceivesomuchbeautyfromtheuniverse.TheexperiencewiththefigsbecamethatliLlegirl’siconicstorywitheverypresenta1onshegave,anditwasthefounda1onforherfirstbookXXXX,basedonherlifeexperiences.Today,shehasbuiltherlifeonthe8FigFactors.Shesharesanabundanceofposi1vityandbeautywiththeworld.Theuniverselistens,hears,speaksandcon1nuouslyreturnsanabundanceofblessingstoher.

SampleBlog

Page 8: PORTFOLIO · PORTFOLIO Cindy Tschosik Founder & Content Writer Ghost Wri1ng Content Marke1ng Website Content Technical Documentaon Cindy@SoconnectedLLC.com (630) 926-8756

TheFlowerWithinConXnuedAsweknow,lifehasitsdifficultmoments.Circumstances,people,eventsandemo1onsimpactourdays,butit’showyouapproachthosemomentsthathelpyoufindthebeauty.Whetheritisabadmood,anargument,anillness,alossorsomethingelse,findingbeautyandposi1vityispossible.Thefirststepistoacceptit,“whatiscausingmetofeelthisway?”Analyzeandiden1fyit.Embracethesitua1onandthefeelings.Becomeobjec1veandcallitlikeitis.Findthepathneededtofixit.Then,fixit.Itmayrequireaconversa1onwithsomeonetovetthroughitandhealthehurt.Maybeprayer,lernggoorforgivenesswillhelpmendit.Maybe1meisrequired.NomaLerhowithappens,howitisfixed,theendresultistofocusonfindingthebeautyinit.Thereisbeautyinandaroundeverything.Onceyoufindthebeauty,freedomendures.Yoursoulwillbefreetoexperienceitandshareyourbeautyandposi1vitywiththeuniverse.It’slikethefig.Theuniversespokeagain.Thefigstorycamefull-circlewhenafriendtoldthatliLlegirl,24yearslater,“afigistheonlyfruitthathasaflowerontheinside.Thefigisself-containedbecauseeverythingitneeds,includingitsbeauty,isontheinside.”Everythingyouneedisinsideyou.Yourcore.Yourheart.Yoursoul.Yourbeauty.Thisiswherethefigfactorsbloom.Thisiswherethemessagesandsymbolsresonatefromtheuniverse.Listen.Hear.Letyourflowerwithincreateanabundanceofbeautyforthewholeworld,andthen,releaseit.LeavealegacythatmakestheworldabeLerplacebecauseyouwereinit.XXXXXXXXXXXXtoembraceposi1vityandfindbeautyinyourprofessionalandpersonallife,byXXXXXX.XXXXXXforhealthyliving,including,reducingfatincookingandaddingcalcium,asasubs1tutetomilk.WriLenbyCindyTschosikCindy@SoConnectedLLC.comNovember10,2015

SampleBlog

Page 9: PORTFOLIO · PORTFOLIO Cindy Tschosik Founder & Content Writer Ghost Wri1ng Content Marke1ng Website Content Technical Documentaon Cindy@SoconnectedLLC.com (630) 926-8756

PublishedAr1cle–TechnicalWri1ng

DataSecurity:Internal&ExternalRiskFactorsPublishedhdps://creditunionbusiness.com/data-security-internal-external-risk-factors/

Page 10: PORTFOLIO · PORTFOLIO Cindy Tschosik Founder & Content Writer Ghost Wri1ng Content Marke1ng Website Content Technical Documentaon Cindy@SoconnectedLLC.com (630) 926-8756

En1reAr1cle–TechnicalWri1ng

NearlyeveryindustryfromAtoZ,includinghealthcare,IRS,hotels,prisons,universi1es,retail,creditagencies,FBI,brokeragefirms,pharmaceu1cals,na1onalsecurity/surveillanceandyes,financialins1tu1onsareimpactedbydatabreachesatsomepointduringtheyear.Unfortunately,2015endswiththeall1mehighof732databreachesexposing176,325,059records.(1)AccordingtoPaulAusickfrom24/7WallStreet,asofmid-December,66breachesoccurredinthebanking/credit/financialindustry.Thesebreachesexposedmorethan5millionrecordswhichis9%ofthetotalnumberofbreachesfortheyearand2.9%oftherecordsexposed.Withtheturnofthenewyear,itisnosurprise,companiesareonalertandrampingupdatasecurityfrombothinsidethecompanyandfromoutsidehackersources.SecurityrisksandaLacksoccurinmanyforms,bothinternallyandexternally.CyberaLacks,phishing(socialaLacks),malwarearethelargestthreatsfromoutsideofthecompany,asexperiencedrecentlybythefollowingbusinesses.

•  Personalinforma1onfor1.1MillionmemberswasfoundtobecompromisedatBlueCross/BlueShield.However,memberpasswordencryp1onpreventedaccesstosocialsecuritynumbers,medicalclaims,employmentrecords,creditcardnumbersandfinancialdata.

•  PremeraBlueCross/BlueShieldwasnotasfortunatewithabreachthatcompromised11.2subscribers’names,birthdates,socialsecuritynumbers,bankaccountinfo,addressesandotherinforma1on.

•  Thebilliondollarbankcyberheistaffected100banksaroundtheworld.Employeeaccountcreden1alsandprivilegeswereobtainedthroughphishing(socialaLacks)tac1cs.FraudulenttransfersandhijackedATMmachinesresultedinalossof$1billion.

Significantdamagecanarisethroughalldatabreaches,butthesilent,unsuspec1ngandunreportedaLacksaremostharmfulandmostprevalentacrosstheglobe.Small,mediumandlargebusinesseshaveexperiencedcountlessopportuni1esoftheZandmaliciousintentfromdownloadeddata,stolenencrypteddrives,printedrecords,virusinstalla1onsandhumanerror.TheZ,maliciousintentanderrorsaccountforthemajorityofinternalsecurityexposure.Infact,Experian,aglobalinforma1onservicesgroup,projectsthat“employees’mistakeswillbecompanies’biggestthreat”in2016.“Althoughthereisheightenedsensi1vityforcyberaLacksamongstbusinessleaders,amajorityofcompanieswillmissthemarkonthelargestthreat:employees.Betweenhumanerrorandmaliciousinsiders,1mehasshownusthemajorityofdatabreachesoriginateinsidecompanywalls.Employeesandnegligencearetheleadingcauseofsecurityincidentsbutremaintheleastreportedissue.”

DataSecurity:Internal&ExternalRiskFactorsPublishedhdps://creditunionbusiness.com/data-security-internal-external-risk-factors/

Page 11: PORTFOLIO · PORTFOLIO Cindy Tschosik Founder & Content Writer Ghost Wri1ng Content Marke1ng Website Content Technical Documentaon Cindy@SoconnectedLLC.com (630) 926-8756

En1reAr1cle–TechnicalWri1ng

DataSecurity:Internal&ExternalRiskFactorscon1nuedThegrowingthreatfromwithin.U.S.companiesandorganiza1onssuffered$40billioninlossesfromunauthorizeduseofcomputersbyemployeesin2014(2).AccordingtoZDNet.com,researchconductedbytheUSComputerEmergencyResponseTeam(Cert)es1matesthatalmost40percentofITsecuritybreachesareperpetratedbypeopleinsidethecompany.CriminalaLacksarepar1cularlylikelytohappenfromtheinside:onerecentstudyes1matedthat90percentofcriminalcomputercrimeswerecommiLedbyemployeesofthecompanyaLacked.

•  DatabaseswerestolenatEpsilon,compromising60–250millionrecords.(3)•  ThebreachatTargetseverelyaffectedbusinesswith110millionrecordscompromised,andthe

aLackwasfromtheinsidenetwork(4)•  54KmembersofMolinaHealthcarewereimpactedwhenaformerCVSemployeedownloaded

customerinforma1onontohislaptop(5)Internalorexternalbreachescomeinallshapes,sizesfromvariousresourcesandbyvarioustypesofcybercriminals.Networkmonitoringofallsystems,filesandemployeeac1vitygreatlyincreasesprotec1onforsmall,mediumandlargesizedbusinessesincludingerror,datadownloads,andtheZofdataanddevices.SecuretheNetworkfromtheFourMajorDataLeakPointsHaveemployees?Havedata?Riskhappensbyuninten1onalhumanerrorandinten1onaltheZ.Therearefourmajordataleakpoints.

1.  EmailMessagingandInstantMessaging.2.Internetuseincludingusingoff-sitestoragesolu1onssuchascloudsharingandfilestorage

applica1ons(GoogleDrive,DropBox,etc.).3.USB/RemovableDriveDevices(thumbdrives,CDs,floppydisks,pictures,externalharddrives,etc.)4.Prin1ngisanotherway,simpleandlessdata,buts1llanotheravenuetowalkdatarightoutthefrontdoor.

Page 12: PORTFOLIO · PORTFOLIO Cindy Tschosik Founder & Content Writer Ghost Wri1ng Content Marke1ng Website Content Technical Documentaon Cindy@SoconnectedLLC.com (630) 926-8756

En1reAr1cle–TechnicalWri1ng

DataSecurity:Internal&ExternalRiskFactorscon1nuedSecurityMeasureswithintheNetwork-AFullServiceInternalSecurityMonitoring/Analysis/ReporXngSystem

Itiscommonthatassupportac1vi1eshavegrowninvolumeandcomplexity,ITbudgetshavedecreased,placingaddedstressonalreadytaxedsystemsandpersonnel.Asaresult,manyorganiza1onsares1llinfirefigh1ngmode,comba1ngcomplianceissues,databreaches,disparatesystemsandan1quatedmanualprocesseswithintheirbusinessandITopera1ons.

SecurityoZen1mesfallsbythewayside,cos1ngmoremoney,frustra1onandpoten1alforbreaches,leaks,andtheZ.Strengtheningthenetworkwithanair-1ghtfull-servicesecuritysystemthatoffers24/7monitoring,analysisandrepor1ngisthefirststeptodeterandpreventinternalsecurityriskswithemployees.Surprisingly,aninternalmonitoringsystemdoesnothavetobecomplicated,norexpensive,butafull-servicesolu1onshouldofferthefollowingfeatures.

KeyFocusAreasforControlThesearethemainfocusareasyourorganiza1onsneedstounderstand&control:1.  Whatsensi1vedataexistsandwhereisitlocated?2.  Localdrives,networkdrives,databases,etc.Dataiseverywhere.Canyoulocateallsensi1vecontent?3.  2Whatuseristakingwhichac1onswithsensi1vedata?4.  Usershavetheabilitytoemail,message,upload,copyandprintallyourdataatanygiven1me.Doyou

knowthatishappening?5.  3Whereisthatsensi1vedatagoing?6.  Wheredidthedatago?Aques1onthatnoonewantstaask.7.  4Whatpoliciesareneededtomi1gatetheriskoftheseac1ons?Doyouhavepoliciesorproceduresin

placetomi1gaterisk?

ImportantFeatures&EffecXveSoluXonsforSecureNetworks1.  Protectcustomers’sensi1veinforma1on.2.  Complywithallgovernmentregula1onssuchasPCI,GLBA,etc.3.  Securecommunica1onswithbusinesspartners,brokersandagents.4.  Automa1callyencrypte-mail,endpointsanddocumentsaccordingtousersecuritypolicie5.  Restrict&monitoraccesstoconfiden1alfinancialinforma1on.6.  Monitor,inspect,encryptandretainanywebmailcommunica1ons.7.  Monitoruserac1onsandretainforensicevidenceofanywrongdoing.8.  Inspectandmonitorcontentacrossmul1pleprotocolslikesocialnetworksandwebmail.BenefitsofInternalSecurityMonitoringSystem1.  ReducetheZ,misuseofinforma1on.2.  Successfulaudits.3.  Understandnow,whatyoudon’tknow(wheredatais,whereitisgoing,howitisbeingused).Preven1ngemployeesandexternalhackersfromretrievingproprietarydatawhetherpersonalinforma1onorintellectualpropertyisahighprioritythatcanbeawell-managed,simpleinstalla1onthatfallswithinareasonablebudget.Thekeyistobesurethatalltheareasforpossiblebreachesarecovered,andauditrequirementsareincorporatedintothefull-serviceplan.

Page 13: PORTFOLIO · PORTFOLIO Cindy Tschosik Founder & Content Writer Ghost Wri1ng Content Marke1ng Website Content Technical Documentaon Cindy@SoconnectedLLC.com (630) 926-8756

SampleAr1cle–TechnicalWri1ng

DataSecurity:Internal&ExternalRiskFactorscon1nuedSecurityMeasureswithintheNetworkAFullServiceInternalSecurityMonitoring/Analysis/ReporXngSystem

Itiscommonthatassupportac1vi1eshavegrowninvolumeandcomplexity,ITbudgetshavedecreased,placingaddedstressonalreadytaxedsystemsandpersonnel.Asaresult,manyorganiza1onsares1llinfirefigh1ngmode,comba1ngcomplianceissues,databreaches,disparatesystemsandan1quatedmanualprocesseswithintheirbusinessandITopera1ons.

SecurityoZen1mesfallsbythewayside,cos1ngmoremoney,frustra1onandpoten1alforbreaches,leaks,andtheZ.Strengtheningthenetworkwithanair-1ghtfull-servicesecuritysystemthatoffers24/7monitoring,analysisandrepor1ngisthefirststeptodeterandpreventinternalsecurityriskswithemployees.Surprisingly,aninternalmonitoringsystemdoesnothavetobecomplicated,norexpensive,butafull-servicesolu1onshouldofferthefollowingfeatures.

KeyFocusAreasforControlThesearethemainfocusareasyourorganiza1onsneedstounderstand&control:1.  Whatsensi1vedataexistsandwhereisitlocated?2.  Localdrives,networkdrives,databases,etc.Dataiseverywhere.Canyoulocateallsensi1vecontent?3.  2Whatuseristakingwhichac1onswithsensi1vedata?4.  Usershavetheabilitytoemail,message,upload,copyandprintallyourdataatanygiven1me.Doyou

knowthatishappening?5.  3Whereisthatsensi1vedatagoing?6.  Wheredidthedatago?Aques1onthatnoonewantstaask.7.  4Whatpoliciesareneededtomi1gatetheriskoftheseac1ons?Doyouhavepoliciesorproceduresin

placetomi1gaterisk?

ImportantFeatures&EffecXveSoluXonsforSecureNetworks1.  Protectcustomers’sensi1veinforma1on.2.  Complywithallgovernmentregula1onssuchasPCI,GLBA,etc.3.  Securecommunica1onswithbusinesspartners,brokersandagents.4.  Automa1callyencrypte-mail,endpointsanddocumentsaccordingtousersecuritypolicie5.  Restrict&monitoraccesstoconfiden1alfinancialinforma1on.6.  Monitor,inspect,encryptandretainanywebmailcommunica1ons.7.  Monitoruserac1onsandretainforensicevidenceofanywrongdoing.8.  Inspectandmonitorcontentacrossmul1pleprotocolslikesocialnetworksandwebmail.BenefitsofInternalSecurityMonitoringSystem1.  ReducetheZ,misuseofinforma1on.2.  Successfulaudits.3.  Understandnow,whatyoudon’tknow(wheredatais,whereitisgoing,howitisbeingused).Preven1ngemployeesandexternalhackersfromretrievingproprietarydatawhetherpersonalinforma1onorintellectualpropertyisahighprioritythatcanbeawell-managed,simpleinstalla1onthatfallswithinareasonablebudget.Thekeyistobesurethatalltheareasforpossiblebreachesarecovered,andauditrequirementsareincorporatedintothefull-serviceplan.

Page 14: PORTFOLIO · PORTFOLIO Cindy Tschosik Founder & Content Writer Ghost Wri1ng Content Marke1ng Website Content Technical Documentaon Cindy@SoconnectedLLC.com (630) 926-8756

SampleAr1cle–TechnicalWri1ng

HowtoPrepareforanIVFCyclePublishedinwww.MyFer1litySpecialist.com,August-October2015

Page 15: PORTFOLIO · PORTFOLIO Cindy Tschosik Founder & Content Writer Ghost Wri1ng Content Marke1ng Website Content Technical Documentaon Cindy@SoconnectedLLC.com (630) 926-8756

ThankYou!

CindyTschosikFounder&ContentWriter

SoConnected,LLC.1202N75thSt.#235

DownersGrove,IL.60515(630)926-8756

[email protected]

LinkedIn:hLps://www.linkedin.com/in/cindytschosik

Thank you for considering SoConnected for your content writing needs. I look forward to helping you get SoConnected with your clients! Sincerely, Cindy Tschosik