Skip to main content

Blog

The Board of Directors Proactive Cybersecurity Mindset

Thursday, July 30, 2020

The Board of Directors Proactive Cybersecurity Mindset

The Board of Directors' responsibility for oversight of the ISP is better managed proactively. A proactive mindset will reduce financial losses, have more efficient processes, gain control of the challenges to the Institution, and gain a competitive advantage over the competition.

Read More...

Categories: Blog

Top 5 Most Common Incident Response Scenarios

Thursday, July 16, 2020

Top 5 Most Common Incident Response Scenarios

Whether it is phishing, malicious network scanning, or ransomware, cyber incidents can be overwhelming experiences. To help you be more prepared, let's discuss the five most common Incident Response scenarios, as well as how to Protect, Detect, and Respond to each one.

Read More...

Categories: Blog

How to Mature Your Disaster Recovery Testing Plan

Tuesday, June 30, 2020

How to Mature Your Disaster Recovery Testing Plan

A challenge many organizations face is understanding if and how they would recover from a disaster or malware event that takes down the production IT infrastructure or datacenter. In today’s workplace, nearly every organization is heavily reliant on IT and may not be able to conduct business without...

Read More...

Categories: Blog

How to Gain Additional Value from Your BIA

Tuesday, June 23, 2020

How to Gain Additional Value from Your BIA

A lot of effort goes into building out a BIA that meets regulation, you might as well make sure you are using that information to benefit your overall Business Continuity Plan, help you mitigate additional risk to your organization, and make better business decisions.

Read More...

Categories: Blog

Should I Test Employee Security Awareness?

Friday, June 5, 2020

Should I Test Employee Security Awareness?

The goal of Security Awareness Training should be similar to coaching T-ball. As IS professionals, we should understand that the audience is not full of security experts, and we need to provide basic knowledge and appropriate action to take when faced with an incident, and we also need to repeatedly...

Read More...

Categories: Blog

Zoom: Is it Safe?

Friday, May 22, 2020

Zoom: Is it Safe?

We've all likely heard of or used Zoom in some way over the last few months. But, is it safe to use at work? How about at home? Learn more about the security risks of using Zoom, what the company is doing to become more secure, and tips for using Zoom securely.

Read More...

Categories: Blog

FFIEC Releases New Cloud Computing Security Guidance

Monday, May 4, 2020

FFIEC Releases New Cloud Computing Security Guidance

The FFIEC’s Security in a Cloud Computing Environment Joint Statement addresses the use of cloud computing services and security risk management principles for the safe and sound use of cloud computing services. Security breaches involving cloud computing services highlight the importance of sound s...

Read More...

Categories: Blog
Page 8 of 27First   Previous   3  4  5  6  7  [8]  9  10  11  12  Next   Last