Sat.Jan 09, 2021 - Fri.Jan 15, 2021

article thumbnail

A brief guide to cyber security risk assessments

IT Governance BC

Cyber security risk assessments are essential for organisations to protect themselves from malicious attacks and data breaches. After all, it’s only once you’re aware of the ways you’re vulnerable that you can put appropriate defences in place. But what exactly does a risk assessment do? Essentially, it helps you answer these three questions: Under what scenarios is your organisation under threat?

article thumbnail

6 Winter Storm Preparations Every Business Should Make

Alert Media

The post 6 Winter Storm Preparations Every Business Should Make appeared first on AlertMedia.

Security 114
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Documentation - Data Classification Policy

The Morning Breach

We also continue our series today on improving your organizations cyber security documentation. We have looked at Vendor Security Questionnaires and the Acceptable Use Policy, today we are going to start the process of data classification. A Data Classification Policy is in place to detail why data classification should be done, and to establish a framework for classifying data based on its sensitivity, value, and criticality to the organization.

article thumbnail

Why you should make cyber risk a business gain, not a loss

Behavior Group

As companies continue to respond to the global pandemic, millions of their employees are working remotely, often from home. While this is the recommended response, it’s also creating new cyber risks. More specifically, organizations face four daunting challenges today that significantly increase their risk exposure: Distributed workforce: Organizations have created a distributed workforce on an… Continue reading.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Recognize what you don’t know — and fill in the gaps

Business Continuity Today

Are you a thinker, a planner, a person that looks for knowledge? To understand what you do not understand you need to recognize what you don’t know, and you must seek to fill in the gaps. The Business Continuity Show Twitter - [link] Facebook - [link] LinkedIn - [link] YouTube - [link] Sister Shows EM Student Web - [link] Twitter - [link] Facebook - [link] LinkedIn - [link] YouTube - [link] EM Weekly Website - [link] Twitter - [link] Facebook - [link] LinkedIn - [link] YouTube - [link] Are you a

More Trending

article thumbnail

Laptop or Device Lost or Stolen - Proactive and Reactive Steps to secure data

The Morning Breach

Laptops and other portable devices (such as phones, tablets, usb drives, and other devices) are frequently stolen or lost. Within your acceptable use policy, employees should be required to report immediately when one of these devices goes missing, so every company at some point is going to need to deal with a missing device. It is being reported that during the breach of the United States Capitol building, that a laptop belonging to House Speaker Nancy Pelosi was stolen.

article thumbnail

The Importance of Non-Profit and Government Partnerships For Small Business Success

Business Resilience Decoded

Episode 60: Kevin Dick of the Carolina Business Development Fund Contact Kevin Dick at: [link] [link] [link] Business Resilience Decoded: [link] [link] [link] [link] [link] Episode 60: Kevin Dick of the Carolina Business Development Fund Contact Kevin Dick at: [link] [link] [link] Business Resilience Decoded: [link] [link] [link] [link] [link]

article thumbnail

Recognize what you don’t know — and fill in the gaps

Business Continuity Today

Are you a thinker, a planner, a person that looks for knowledge? To understand what you do not understand you need to recognize what you don’t know, and you must seek to fill in the gaps. The Business Continuity Show Twitter - [link] Facebook - [link] LinkedIn - [link] YouTube - [link] Sister Shows EM Student Web - [link] Twitter - [link] Facebook - [link] LinkedIn - [link] YouTube - [link] EM Weekly Website - [link] Twitter - [link] Facebook - [link] LinkedIn - [link] YouTube - [link] Are you a

article thumbnail

How Our Customers Are Using AlertMedia to Improve Operations, Internal Communications, and Overall Efficiency

Alert Media

The post How Our Customers Are Using AlertMedia to Improve Operations, Internal Communications, and Overall Efficiency appeared first on AlertMedia.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Intel to reveal ransomware capabilities in 11th generation vPro CPUs

The Morning Breach

Intel has added ransomware detection capabilities at the silicon level in it’s 11 th generation Intel Core vPro CPUs with support for the Hardware Shield and Threat Detection Technology or TDT features. Through a partnership with Boston based Cyberreason, these new features are expected in the first half of 2021. Hardware Shield is a technology that will lock down the UEFI/BIOS, whereas TDT will utilize the CPU telemetry and ML heuristics to detect possibly malicious code.

Malware 40
article thumbnail

The Importance of Non-Profit and Government Partnerships For Small Business Success

Business Resilience Decoded

Episode 60: Kevin Dick of the Carolina Business Development Fund Contact Kevin Dick at: [link] [link] [link]. Business Resilience Decoded: [link] [link] [link] [link] [link] Episode 60: Kevin Dick of the Carolina Business Development Fund Contact Kevin Dick at: [link] [link] [link]. Business Resilience Decoded: [link] [link] [link] [link] [link].

article thumbnail

Upcoming FEMA Webinar- Jan 26

Disasters and Faith-Based Organizations

Houses of Worship Continuity Planning. Tuesday, January 26, 2021 11:00:00 AM EST – 12:30:00 PM EST.

article thumbnail

Parler Shutdown and Section 230 - What does it mean to you?

The Morning Breach

We begin today with a look at the recent Parler shut down and what it means to you as a business owner. Politics aside, the recent actions of multiple private technology providers to decide to no longer do business with a company should have you evaluating your technology stack as well. For the vast majority of us, we will never be in the same boat as Parler found themselves in, but precedent has been set and now it should be included in your business continuity plans. .

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Third Malware Strain discovered in SolarWinds Supply Chain CyberAttack

The Morning Breach

A third malware strain has been discovered in the SolarWinds Supply Chain Attack has been identified by CrowdStrike, and it sheds some light on how hackers compromised the SolarWinds Orion app build process. . Named Sunspot, this finding adds to the previously discovered Sunburst and Teardrop malware strains. While Sunspot is the latest discovery, there is evidence that it was the first one used, actually going back to September 2019, when cyber criminals first breached SolarWinds internal netw

Malware 40
article thumbnail

The Importance of Non-Profit and Government Partnerships For Small Business Success

Business Resilience Decoded

Episode 60: Kevin Dick of the Carolina Business Development Fund Contact Kevin Dick at: [link] [link] [link]. Business Resilience Decoded: [link] [link] [link] [link] [link] Episode 60: Kevin Dick of the Carolina Business Development Fund Contact Kevin Dick at: [link] [link] [link].