article thumbnail

The Biggest Cyber Threats to Law Firms

Embroker

Phishing Attacks A very common type of cyber attack, phishing can take the form of text messages, emails, and websites that deceive people into downloading malware or giving up personal information. Ransomware The threat is in the name when it comes to this cyber attack tactic. Mobile device vulnerabilities: You’re always working.

article thumbnail

“Test your Disaster Recovery Plan”, With Jason Remillard and Richard Greenberg

Thrive Global

As a part of our series about “5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy and Cybersecurity”, I had the pleasure of interviewing Richard Greenberg, CISSP, a well-known Cyber Security Leader and Evangelist, CISO, Advisor, and speaker. Richard is an Information Systems Security Association (ISSA) ?Distinguished

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

It’s National Cybersecurity Month. Here Are 7 Ways to Keep Your Company Cyber-Safe

AvilarHR

This month, encourage all employees to practice these cyber-smart behaviors. Remind your employees, contractors, managers, and leadership team about their role in keeping your company cyber-secure. Some companies are planning events to engage employees. 3: Update Your Software. Share cybersecurity tip sheets.

article thumbnail

Test the Plan, Plan the Test – Why Successful Business Continuity Plans Are Put into Action Before a Crisis

OnSolve

In fact, 75 percent of companies without a continuity plan fail in three years after facing a disaster. A business continuity plan provides your company with the roadmap to navigate a major business disruption, including a natural disaster or large-scale emergency. Who Should Be Involved in the Test? Your emergency response team.

article thumbnail

A Discussion with Melbourne, Australia’s, Thomas Leen: “Building Trust is the Foundation to a Healthy Work Environment”

Thrive Global

I am a computer engineer by qualification and have worked in technology for close to 29 years. From a technology perspective, during the initial years of my career I used to work on Unix systems and networking technologies such as token ring that are obsolete today. Six years later in 2003 I got my CISSP certification.

article thumbnail

How to Be CyberSmart in a COVID-19 World

AvilarHR

Here’s how COVID is influencing cybersecurity – and what we can all do to help keep our companies, workforces, and families more cyber-secure this year. Cybercriminals were there to hack into those systems. Intercepting non-secure communications. Update business continuity plans. Be email vigilant.

article thumbnail

What Is Cyber Risk Management Framework?

U-Next

As we continue to rely on technology more and more, the risk of cyber-attacks grows significantly. . Cybersecurity is a broad term that protects computer networks, information systems, and data from attack by unauthorized access or damage. What Is Cyber Risk Management Framework? . It’s simple.