Many companies aren’t focused on cybersecurity disciplines directly, nor do they know how to optimize their cybersecurity. Therefore, it becomes the customers’ IT and technology partners’ job to focus on the basics, creating a faster and more fluid response for their clients. Let’s look at three ways partners can advise customers on their cybersecurity needs.
Security speaks to Kevin Dooley, Senior Director of Security and Transportation for the San Diego Padres, about the approach his team is taking to fan and player safety.
Specops researchers analyzed more than 800 million compromised passwords to determine the popularity of Division 1 Football Bowl Subdivision
programs and their team mascots and nicknames appearing on breached passwords lists.
Instead of disrupting development with gates, organizations can implement a security champions program to build security guardrails into development. Here are five considerations for implementing an effective security champions program.
Any organization handling personally identifiable information through an IVR or contact center must secure its systems and implement proper risk management protocols. If they don’t, they and their customers may well suffer severe financial and reputational damage in the years to come.
Terri Patterson is a recognized expert in behavioral assessment and risk mitigation and a Principal in Control Risks’ Crisis and Security Consulting practice. Here, Patterson delves into the impact of mental health issues in the corporate environment.