Remove Certification Remove Cyber Security Remove Exercises Remove Planning Tools
article thumbnail

The Biggest Cyber Threats to Law Firms

Embroker

Phishing Attacks A very common type of cyber attack, phishing can take the form of text messages, emails, and websites that deceive people into downloading malware or giving up personal information. Ransomware The threat is in the name when it comes to this cyber attack tactic. Mobile device vulnerabilities: You’re always working.

article thumbnail

“Test your Disaster Recovery Plan”, With Jason Remillard and Richard Greenberg

Thrive Global

As a part of our series about “5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy and Cybersecurity”, I had the pleasure of interviewing Richard Greenberg, CISSP, a well-known Cyber Security Leader and Evangelist, CISO, Advisor, and speaker. Richard is an Information Systems Security Association (ISSA) ?Distinguished

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

It’s National Cybersecurity Month. Here Are 7 Ways to Keep Your Company Cyber-Safe

AvilarHR

This month, encourage all employees to practice these cyber-smart behaviors. Remind your employees, contractors, managers, and leadership team about their role in keeping your company cyber-secure. Some companies are planning events to engage employees. 3: Update Your Software. Share cybersecurity tip sheets.

article thumbnail

A Discussion with Melbourne, Australia’s, Thomas Leen: “Building Trust is the Foundation to a Healthy Work Environment”

Thrive Global

I am a computer engineer by qualification and have worked in technology for close to 29 years. From a technology perspective, during the initial years of my career I used to work on Unix systems and networking technologies such as token ring that are obsolete today. Six years later in 2003 I got my CISSP certification.

article thumbnail

What Is Cyber Risk Management Framework?

U-Next

As we continue to rely on technology more and more, the risk of cyber-attacks grows significantly. . Cybersecurity is a broad term that protects computer networks, information systems, and data from attack by unauthorized access or damage. What Is Cyber Risk Management Framework? . It’s simple.

article thumbnail

The Ultimate Guide To OKRs And Templates 

Engagedly

Fierce competition, ever-changing technology, and a capricious business landscape, coupled with the great resignation and aftermath of the pandemic, are the leading factors that are shaping global business. . OKR is a great leadership exercise that can be conducted either monthly or quarterly. Introduction To OKRs. Decoding OKRs.