Sat.Feb 17, 2018 - Fri.Feb 23, 2018

article thumbnail

Beyond hacking – the human threat of business email compromise scam emails 

Crisis Response Journal

Despite the continued focus in organisations on cyber security and the technical methods to prevent breaches, the simple fact remains that too many people still think that the threat is purely technology-based, writes David Stewart.

article thumbnail

Why do we need a risk-based approach to authentication?

Behavior Group

authentication 20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the time-tested method of the trusted perimeter. Firewalls were relied on to keep out external threats, and anything within the network was considered secure and safe. Today, however,… Continue reading.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3gBC – Slimming your plans…

Plan B Consulting

In the third instalment of 3gBC, Charlie advises BC professionals how to make their plans slimmer, both immediately and radically. I thought for this week’s bulletin I would continue sharing my ideas on Third Generation BC (3gBC), by looking at how to make your plans slimmer and more agile. Apologies to the two Julie’s who asked for an article on the KFC incident, I will try and write about it next week, as it seems the situation is still on-going.

article thumbnail

Dynamic Businesses need Resilient Applications

VOX Veritas

Ensure business applications are up and running…no matter what

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

The safety of children and young adults 

Crisis Response Journal

As regular readers of CRJ will be aware, we have often reported on how young people have been exploited by criminal and terrorist groups.

article thumbnail

3gBC – Slimming your plans…

Plan B Consulting

In the third instalment of 3gBC, Charlie advises BC professionals how to make their plans slimmer, both immediately and radically. I thought for this week’s bulletin I would continue sharing my ideas on Third Generation BC (3gBC), by looking at how to make your plans slimmer and more agile. Apologies to the two Julie’s who asked for an article on the KFC incident, I will try and write about it next week, as it seems the situation is still on-going.