Sat.Jan 18, 2020 - Fri.Jan 24, 2020

article thumbnail

Four Ways to Achieve a Zero Trust Security Model

Behavior Group

Put 2019 in the record books — for cybercrime, that is. Zero Trust Security Model,cybercrime, ransomware, security According to Risk Based Security, a global leader in vulnerability intelligence, breach data and risk ratings, 2019 was on track to be “the worst year on record” for cybercrime. We’ve seen this to be true in the near… Continue reading.

article thumbnail

Pandemic Planning: Coronavirus (2019-nCoV) – Should We Panic?

Plan B Consulting

Pandemic Planning: Coronavirus (2019-nCoV) – Should we panic? This week Charlie looks at the ongoing outbreak of Coronavirus, and what precautions your organisation should take to be prepared. You can’t have missed the outbreak of the flu-like disease, Coronavirus, and the China’s response of shutting down travel from the City of Wuhan, as well as several other areas and tourist attractions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Pandemic Planning: Coronavirus (2019-nCoV) – Should We Panic?

Plan B Consulting

Pandemic Planning: Coronavirus (2019-nCoV) – Should we panic? This week Charlie looks at the ongoing outbreak of Coronavirus, and what precautions your organisation should take to be prepared. You can’t have missed the outbreak of the flu-like disease, Coronavirus, and the China’s response of shutting down travel from the City of Wuhan, as well as several other areas and tourist attractions.

article thumbnail

Business Disruption Attacks Most Prevalent in Last 12 Months

Behavior Group

Business disruption was the main objective of attackers in the last year, with ransomware, DDoS and malware commonly used. Business Disruption Attacks According to the CrowdStrike Services Cyber Front Lines Report, which offers observations from its incident response and proactive services, a third (36%) of incidents often involved ransomware, destructive malware or denial of service… Continue reading.

Malware 52
article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p