Skip to main content

Blog

How to Mature Your Disaster Recovery Testing Plan

Tuesday, June 30, 2020

How to Mature Your Disaster Recovery Testing Plan

A challenge many organizations face is understanding if and how they would recover from a disaster or malware event that takes down the production IT infrastructure or datacenter. In today’s workplace, nearly every organization is heavily reliant on IT and may not be able to conduct business without...

Read More...

Categories: Blog

How to Gain Additional Value from Your BIA

Tuesday, June 23, 2020

How to Gain Additional Value from Your BIA

A lot of effort goes into building out a BIA that meets regulation, you might as well make sure you are using that information to benefit your overall Business Continuity Plan, help you mitigate additional risk to your organization, and make better business decisions.

Read More...

Categories: Blog

Should I Test Employee Security Awareness?

Friday, June 5, 2020

Should I Test Employee Security Awareness?

The goal of Security Awareness Training should be similar to coaching T-ball. As IS professionals, we should understand that the audience is not full of security experts, and we need to provide basic knowledge and appropriate action to take when faced with an incident, and we also need to repeatedly...

Read More...

Categories: Blog

Zoom: Is it Safe?

Friday, May 22, 2020

Zoom: Is it Safe?

We've all likely heard of or used Zoom in some way over the last few months. But, is it safe to use at work? How about at home? Learn more about the security risks of using Zoom, what the company is doing to become more secure, and tips for using Zoom securely.

Read More...

Categories: Blog

FFIEC Releases New Cloud Computing Security Guidance

Monday, May 4, 2020

FFIEC Releases New Cloud Computing Security Guidance

The FFIEC’s Security in a Cloud Computing Environment Joint Statement addresses the use of cloud computing services and security risk management principles for the safe and sound use of cloud computing services. Security breaches involving cloud computing services highlight the importance of sound s...

Read More...

Categories: Blog
Page 1 of 22First   Previous   [1]  2  3  4  5  6  7  8  9  10  Next   Last