Remove Malware Remove Response Plan Remove Webinar
article thumbnail

Aligning Cyber Incident Response Planning with Your BC/DR Program

eBRP

In the IT realm, CIO’s and CISO’s now focus their efforts on mitigating those risks, and planning responses to potential data breaches, malware and other cyber threats. As a result, more and more organizations have begun developing Cybers Security Incident Response Plans (CSIRPs).

article thumbnail

Looking After Your People During a Cyber Incident

Plan B Consulting

As part of the course, I did a contemporary case study and as part of the case study, I commented on some of the issues people faced during their response. Combined with a webinar I watched last week, I thought I would share and explore some ideas on the above subject.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Looking After Your People During a Cyber Incident

Plan B Consulting

As part of the course, I did a contemporary case study and as part of the case study, I commented on some of the issues people faced during their response. Combined with a webinar I watched last week, I thought I would share and explore some ideas on the above subject.

article thumbnail

Looking After Your People During a Cyber Incident

Plan B Consulting

As part of the course, I did a contemporary case study and as part of the case study, I commented on some of the issues people faced during their response. Combined with a webinar I watched last week, I thought I would share and explore some ideas on the above subject.

article thumbnail

How to Prevent Third-Party Vendor Data Breaches

Reciprocity

Here are a few instances of third-party violations from recent history: Customers of Click Studios’ business password manager Passwordstate received a breach notification in 2021 after hackers used the app’s update mechanism to spread malware to users. Therefore, incident response plans are critical.

Audit 52