Remove Hazard Remove Malware Remove Response Plan
article thumbnail

How to Prevent Third-Party Vendor Data Breaches

Reciprocity

Here are a few instances of third-party violations from recent history: Customers of Click Studios’ business password manager Passwordstate received a breach notification in 2021 after hackers used the app’s update mechanism to spread malware to users. Therefore, incident response plans are critical.

Audit 52
article thumbnail

Looking After Your People During a Cyber Incident

Plan B Consulting

I recently attended Maersk’s webinar, where the presenter spoke about the complete loss of IT due to the NotPetya malware. The old adage is that people are our greatest asset, and if this is true then we should ensure that within our cyber response plans and playbooks there are procedures for looking after people.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Looking After Your People During a Cyber Incident

Plan B Consulting

I recently attended Maersk’s webinar, where the presenter spoke about the complete loss of IT due to the NotPetya malware. The old adage is that people are our greatest asset, and if this is true then we should ensure that within our cyber response plans and playbooks there are procedures for looking after people.

article thumbnail

Risk Assessment vs Risk Analysis

Reciprocity

Various types of hazards must be considered. After identifying hazards and risks, consider how they are harmful and the possible outcomes. Implement controls and risk response plans to prevent and mitigate risk. Economic risk. Operational risk. Third-party risk. Quality risk. What is the Risk Assessment Process?

article thumbnail

Looking After Your People During a Cyber Incident

Plan B Consulting

I recently attended Maersk’s webinar, where the presenter spoke about the complete loss of IT due to the NotPetya malware. The old adage is that people are our greatest asset, and if this is true then we should ensure that within our cyber response plans and playbooks there are procedures for looking after people.