Robert C. Covington

Want to Join?
Opinions expressed by ICN authors are their own.

Robert C. Covington, the "Go To Guy" for small and medium business security and compliance, is the founder and president of togoCIO.com. Mr. Covington has B.S. in Computer Science from the University of Miami, with over 30 years of experience in the technology sector, much of it at the senior management level. His functional experience includes major technology implementations, small and large-scale telecom implementation and support, and operations management, with emphasis on high-volume, mission critical environments. His expertise includes compliance, risk management, disaster recovery, information security and IT governance.

Mr. Covington began his Atlanta career with Digital Communications Associates (DCA), a large hardware/software manufacturer, in 1984. He worked at DCA for over 10 years, rising to the position of Director of MIS Operations. He managed the operation of a large 24x7 production data center, as well as the company’s product development data center and centralized test lab.

Mr. Covington also served as the Director of Information Technology for Innotrac, which was at the time one of the fastest growing companies in Atlanta, specializing in product fulfillment. Mr. Covington managed the IT function during a period when it grew from 5 employees to 55, and oversaw a complete replacement of the company’s systems, and the implementation of a world-class call center operation in less than 60 days.

Later, Mr. Covington was the Vice President of Information Systems for Teletrack, a national credit bureau, where he was responsible for information systems and operations, managing the replacement of the company’s complete software and database platform, and the addition of a redundant data center. Under Mr. Covington, the systems and related operations achieved SAS 70 Type II status, and received a high audit rating from the Federal Deposit Insurance Corporation and the Office of the Comptroller of the Currency.

Mr. Covington also served as Director of Information Technology at PowerPlan, a software company providing software for asset-intensive industries such as utilities and mining concerns, and integrating with ERP systems including SAP, Oracle Financials, and Lawson. During his tenure, he redesigned PowerPlan's IT infrastructure using a local/cloud hybrid model, implemented IT governance based on ITIT and COBIT, and managed the development of a new corporate headquarters.

Most recently, Mr. Covington, concerned about the growing risks facing small and medium business, and their lack of access to an experienced CIO, formed togoCIO, an organization focused on providing simple and affordable risk management and information security services.

Mr. Covington currently serves on the board of Act Together Ministries, a non-profit organization focused on helping disadvantaged children, and helping to strengthen families. He also leads technical ministries at ChristChurch Presbyterian. In his spare time, he enjoys hiking and biking.

The opinions expressed in this blog are those of Robert C. Covington and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Improve your internet privacy, with or without help from the government

Insiders -- the invisible threat lurking in your office

Insiders -- the invisible threat lurking in your office

With all of the focus in the business world recently related to hackers, we have tended to overlook a group of potential bad actors who have already penetrated our perimeter security, and have access to our facilities – our employees...

Phishing: Draining the corporate bottom line

Phishing: Draining the corporate bottom line

Many don't realize the drain phishing attacks place on the information technology team, particularly the information security organization. Their efforts to contain phishing can leave a major dent in the corporate bottom line.

7 tips to turn threat data into true threat intelligence

7 tips to turn threat data into true threat intelligence

Threat intelligence can be your best friend or your worst enemy. Here are some tips to make sure you are making the most of it.

These are the threats that keep me awake at night

These are the threats that keep me awake at night

We have fortunately reached the date on the calendar when the myriad of articles predicting hot information security issues for 2017 have begun to wind down. I say fortunately, because I personally have never found much use for them....

Cybersecurity standards and guidelines -- are you just checking the boxes?

Cybersecurity standards and guidelines -- are you just checking the boxes?

While it is important for any organization to adopt a cybersecurity standard, just checking all of the boxes on one will not make you secure.

Is antivirus software dead at last?

Is antivirus software dead at last?

The debate about whether antivirus software is still useful has been going on for a few years now. This technology was once the mainstay of the security efforts for most businesses and home users. The challenge of late is the ability...

The risk of data theft -- here, there and everywhere

The risk of data theft -- here, there and everywhere

Today, the challenge of protecting sensitive data has increased exponentially, due to the fact that data has been leaking into the cloud, and individual PCs and mobile devices. This is how to address the challenges of this data...

Are we drowning in a sea of negative security press?

Are we drowning in a sea of negative security press?

It would seem from news accounts that the increase in the number of new vulnerabilities in devices, software and systems is escalating out of control. While the crisis is real, it has been blown a bit out of proportion by the consumer...

Product security: Not just bells and whistles

Product security: Not just bells and whistles

The announcement this past week about the vulnerability in an insulin pump made by Johnson & Johnson was just one more of an ongoing series of vulnerabilities found in medical and other products. It seems that a common element...

Are you encouraging your employees to take security risks?

Are you encouraging your employees to take security risks?

We impose a growing burden of security rules on employees, while insisting that their productivity at least remain constant. In so doing, we may be encouraging them to put their organizations at risk.

The changing data protection paradigm

The changing data protection paradigm

In just a few years, the industry has experienced a data paradigm shift. Most organizations now must deal with massive amounts of incoming data, in various forms, ranging from structured information in the form of databases and lists...

Load More