Remove Hazard Remove Malware Remove Webinar
article thumbnail

Looking After Your People During a Cyber Incident

Plan B Consulting

Combined with a webinar I watched last week, I thought I would share and explore some ideas on the above subject. I recently attended Maersk’s webinar, where the presenter spoke about the complete loss of IT due to the NotPetya malware. Similar to what we would find in hazard and natural disaster response plans.

article thumbnail

Looking After Your People During a Cyber Incident

Plan B Consulting

Combined with a webinar I watched last week, I thought I would share and explore some ideas on the above subject. I recently attended Maersk’s webinar, where the presenter spoke about the complete loss of IT due to the NotPetya malware. Similar to what we would find in hazard and natural disaster response plans.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Looking After Your People During a Cyber Incident

Plan B Consulting

Combined with a webinar I watched last week, I thought I would share and explore some ideas on the above subject. I recently attended Maersk’s webinar, where the presenter spoke about the complete loss of IT due to the NotPetya malware. Similar to what we would find in hazard and natural disaster response plans.

article thumbnail

How to Prevent Third-Party Vendor Data Breaches

Reciprocity

Here are a few instances of third-party violations from recent history: Customers of Click Studios’ business password manager Passwordstate received a breach notification in 2021 after hackers used the app’s update mechanism to spread malware to users. Share information security training webinars and other materials to grow their interest.

Audit 52