Remove All-Hazards Remove Malware Remove Webinar
article thumbnail

Looking After Your People During a Cyber Incident

Plan B Consulting

Combined with a webinar I watched last week, I thought I would share and explore some ideas on the above subject. In the initial few days, it might be difficult to contact all your staff, so this becomes even more important. If a cyber-attack occurs and access to all systems is lost, it can be very disorienting for your staff.

article thumbnail

Looking After Your People During a Cyber Incident

Plan B Consulting

Combined with a webinar I watched last week, I thought I would share and explore some ideas on the above subject. In the initial few days, it might be difficult to contact all your staff, so this becomes even more important. If a cyber-attack occurs and access to all systems is lost, it can be very disorienting for your staff.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Looking After Your People During a Cyber Incident

Plan B Consulting

Combined with a webinar I watched last week, I thought I would share and explore some ideas on the above subject. In the initial few days, it might be difficult to contact all your staff, so this becomes even more important. If a cyber-attack occurs and access to all systems is lost, it can be very disorienting for your staff.

article thumbnail

How to Prevent Third-Party Vendor Data Breaches

Reciprocity

According to the Verizon 2022 Data Breach Investigations Report, 62 percent of all data breaches happen via third-party vendors. Defined data storage and transfer policies act as a protective layer, ensuring data integrity at all levels. Share information security training webinars and other materials to grow their interest.

Audit 52