Remove Authentication Remove BCP Remove Continuity Planning
article thumbnail

Cyber Security: 8 Steps to Cyber Resilience

NexusTek

Multi-Factor Authentication (MFA) adds an extra layer of identification to stop cyber threats from slipping through unsecured devices. A well-tested incident response plan can reduce the time needed to identify and contain a data breach by 74 days. From automating processes to data restore, a BCP can make all the difference.

article thumbnail

Active Directory and Single Sign On (SSO) in Business Continuity

KingsBridge BCP

It is standard, best practice not to tie your Business Continuity Plan into your single point of failure. Unfortunately, Single Sign On relies on Active Directory to authenticate users, so all of the pitfalls of AD discussed above also apply to SSO. We recommend being very cautious when relying on SSO for accessing your BCP.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SMB Cyber Summit

BCP Builder

I quickly changed the compromised password, another similar password, set up two factor authentication and checked my login records. If you want to increase your Organizational Resilience, start with preparing a Business Continuity Plan and check out BCP Builder’s Business Continuity Planning Templates.

BCP 52
article thumbnail

SMB Cyber Summit

BCP Builder

In addition to the presentation, I have offered four E-Book’s for free download on the following topics: Business Continuity and Risk Management. How to choose a Business Continuity Plan Template. Pandemic Planning Guide. The post SMB Cyber Summit appeared first on BCP Builder. Phishing Email.

BCP 52
article thumbnail

Cyber Security: 8 Steps to Cyber Resilience

NexusTek

Multi-Factor Authentication (MFA) adds an extra layer of identification to stop cyber threats from slipping through unsecured devices. A well-tested incident response plan can reduce the time needed to identify and contain a data breach by 74 days. From automating processes to data restore, a BCP can make all the difference.

article thumbnail

Cloud Server

BCP Builder

Feeback from BCP Builder Community on LinkedIn : Data in Triplicate If your data is not in 3 places then it doesn’t exist. IT service continuity management is an essential element in your solution considerations. We regularly get passwords and bypass 2 factor authentication on penetration tests. The attackers do too.

BCP 52
article thumbnail

Cloud Server

BCP Builder

Feeback from BCP Builder Community on LinkedIn : Data in Triplicate. IT service continuity management is an essential element in your solution considerations. We regularly get passwords and bypass 2 factor authentication on penetration tests. The post Cloud Server appeared first on BCP Builder. The attackers do too.

BCP 52