Skip to main content

Resources

{Cyber Byte Video} Building a Culture of Cybersecurity

Friday, December 1, 2017

{Cyber Byte Video} Building a Culture of Cybersecurity
It's time to shift our thinking when it comes to security awareness training. Yearly education and testing just doesn't cut it in today's cyber world. Security awareness is a topic we should have in front of our people on a much more consistent basis. So, what does good security awarenes...
Categories: Blog, Education

Hail A Different Ride – Uber Breached in 2016

Wednesday, November 29, 2017

Hail A Different Ride – Uber Breached in 2016
Stop Us If You’ve Heard This Before... Last week, Uber – the embattled ridesharing company - made public details regarding the compromise of personal user data dating back to October 2016. Information potentially leaked in the breach includes the email addresses, phone numbers, and na...

Three Considerations for Upgrading Your Business Continuity Plan

Wednesday, November 22, 2017

Three Considerations for Upgrading Your Business Continuity Plan
As we approach the end of 2017, it’s always a good time to look back on the lessons we learned and look ahead at improving our Information Security Plan, especially our Emergency Preparedness plans. Here are three quick and easy wins that can take any Business Continuity Plan to the next level.
Categories: Blog

{Article} What Does a Good BIA Look Like?

Wednesday, November 22, 2017

{Article} What Does a Good BIA Look Like?
When creating a BIA, there are going to be three (3) main components that you should address to get the best results, including 1) Impacts, 2) Timeframes, and 3) Dependencies. This article will cover each of these BIA components, along with a little information on your business processes themselves.
Categories: Blog

{Demo} Automate Your IT Risk Assessment

Friday, November 17, 2017

{Demo} Automate Your IT Risk Assessment
Discover the power of TRAC and easily create your companies detailed IT risk assessment. Develop your inherent risk, residual risk, and future risk scores that help make sound business decisions. Date:  Demos are held on Thursday of each week. You can pick a date that works for you upon...
Page 1 of 13First   Previous   [1]  2  3  4  5  6  7  8  9  10  Next   Last   
Let's Connect
SBS CyberSecurity LinkedIn SBS CyberSecurity Facebook SBS CyberSecurity Twitter
© 2017 SBS CyberSecurity
Primary Mailing Address: 700 S Washington Ave Ste 200, Madison, SD 57042
(605) 923-8722