Skip to main content

Resources

Hail A Different Ride – Uber Breached in 2016

Wednesday, November 29, 2017

Hail A Different Ride – Uber Breached in 2016

Stop Us If You’ve Heard This Before... Last week, Uber – the embattled ridesharing company - made public details regarding the compromise of personal user data dating back to October 2016. Information potentially leaked in the breach includes the email addresses, phone numbers, and na...

Read More...

Categories: Blog, In the News

Three Considerations for Upgrading Your Business Continuity Plan

Wednesday, November 22, 2017

Three Considerations for Upgrading Your Business Continuity Plan

As we approach the end of 2017, it’s always a good time to look back on the lessons we learned and look ahead at improving our Information Security Plan, especially our Emergency Preparedness plans. Here are three quick and easy wins that can take any Business Continuity Plan to the next level.

Read More...

Categories: Blog

{Article} What Does a Good BIA Look Like?

Wednesday, November 22, 2017

{Article} What Does a Good BIA Look Like?

When creating a BIA, there are going to be three (3) main components that you should address to get the best results, including 1) Impacts, 2) Timeframes, and 3) Dependencies. This article will cover each of these BIA components, along with a little information on your business processes themselves.

Read More...

Categories: Blog

Testing Software Patches is Critical

Monday, October 30, 2017

Testing Software Patches is Critical

There are numerous, important components of a strong Patch Management Program; including identifying the right patches, establishing a formal schedule, deploying, and making sure your patching is effective. However, one often-overlooked, yet critical component is Patch Testing.

Read More...

Categories: Blog

Holding Your Employees Accountable

Friday, October 27, 2017

Holding Your Employees Accountable

If you believe that People are your greatest security weakness then you, likely, test employees on a regular basis to spot phishing emails, follow proper protocols when “vendors” show up at the door unexpectedly, or keep confidential information safe. What steps are taken after an employee fails?

Read More...

Categories: Blog
Page 8 of 16First   Previous   3  4  5  6  7  [8]  9  10  11  12  Next   Last