December, 2016

article thumbnail

Top 20 #Backup and Recovery Leaders and Influencers You Need to Follow List – @Channelbloom #18.

ChannelBloom

Posted on August 10, 2016 by Lauren Cooke in Backup and Recovery Solutions News. Staying on top of the latest industry news and trends is a big part of the job for any Backup and Recovery pro, and Twitter is a great resource. but with 243 million active users, it can be difficult to parse the good from the bad. Here is a great place to start. Follow these the top 21 influencers and thought leaders in the backup and disaster recovery Twittersphere, presented here in no particular order.

Backup 130
article thumbnail

Knowing your ‘knowns’ and managing the unknown

Crisis Response Journal

Cyber attacks and data breaches are here to stay. As long as confidential commercial data and personal information hold a financial value on the black market, the battle between cyber criminals and corporations will continue.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The difficult path to cyber resilience

Behavior Group

By Help Net Security on 19 December 2016 cyber resilience Global organizations are more confident than ever that they can predict and resist a sophisticated cyber attack, but are falling short of investments and plans to recover from a breach in today’s expanding threat landscape. Now in its 19th year, a survey of 1,735 organizations… Continue reading.

article thumbnail

Sending staff home after an incident – a checklist!

Plan B Consulting

This week I share some information about staffing during an incident and some of the things that should be planned for prior to incidents taking place. Last week I delivered a series of exercises for a Bank in Portugal. One of the exercises was looking at how their IT development staff would manage an incident if they were to be displaced by more time critical staff from another office.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Emergency Alert Systems Both Then and Now

Alert Media

The Government’s Take on Alerts. I was surprised to learn that the federal Emergency Alert System (EAS) was only used at the local level until November 9, 2011 at 2 pm eastern. This date marked the first time FEMA ever tested the EAS nationwide. All of the television and radio test sirens you have ever heard were initiated by your local authorities.

Alert 52

More Trending

article thumbnail

Sending staff home after an incident – a checklist!

Plan B Consulting

This week I share some information about staffing during an incident and some of the things that should be planned for prior to incidents taking place. Last week I delivered a series of exercises for a Bank in Portugal. One of the exercises was looking at how their IT development staff would manage an incident if they were to be displaced by more time critical staff from another office.

article thumbnail

A Day in the Life of a Security Consultant

Behavior Group

By Security Magazine on 13 December 2016 risk assessment, risk mitigation, security career, security consultant, security inspections A lack of skilled staff remains the top security concern for organizations, according to the State of Security Operations Report. One way organizations can mitigate this challenge is to hire security consultants. These professionals work closely with their… Continue reading.

article thumbnail

12 tips for implementing secure business practices

Behavior Group

By Help NET Security on 12 December 2016 backup, CXO, insider threat, Internet of Things, passwords, phishing, PoS, strategy, tips Security experts prepared a list of a dozen tips for implementing secure business practices during the 2016 holiday season. 1. Limit temporary worker privileges Many organizations employ temporary workers during the holidays to address… Continue reading.

article thumbnail

Cyber Threats and Mass Communications Systems

Alert Media

The post Cyber Threats and Mass Communications Systems appeared first on AlertMedia.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Never stop learning – the need for a risk-based approach to cyber-security

Behavior Group

By Security Magazine on 1 December 2016 cyber-security It probably comes as no surprise to IT security professionals that cyber-attacks are now becoming more sophisticated and more commonplace. For years, cyber-experts have been warning that we are entering the “age of the cyber-attack,” predicting that a digital attack will now bring about the end of… Continue reading.

article thumbnail

5 Reasons It’s Time to Let Employees Work Remotely

Alert Media

The post 5 Reasons It’s Time to Let Employees Work Remotely appeared first on AlertMedia.

article thumbnail

News online Backup Software Certifications

Titan Data Services

Congratulations to our technical specialist: Uyen Nguyen for earning her higher level certification for the Asigra Cloud Backup software.

Backup 40
article thumbnail

Control in the Chaos

Alert Media

The post Control in the Chaos appeared first on AlertMedia.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.