The Federal Communications Commission developed “Small Biz Cyber Planner 2.0” by teaming with members of the public and private sector, including the Department of Homeland Security, the National Cyber Security Alliance and the Chamber of Commerce.
If you asked your employees to define “cybersecurity,” what would they say?
July 1, 2014
By screening a provider for these qualities, you’ll accomplish much more than a manager who simply wants to “check the box” and get it over with. You’ll walk away knowing participants are getting the training that’s right for them, not an endless sea of faceless masses.
As a child, I played soccer fervently. My father, a German immigrant to the U.S. who was very passionate about the sport, explained to me that there is no game that brings the world closer together.
According to security researchers at IBM and the Cyber Security Intelligence Index, 95 percent of successful hack attacks or incidents were because of some type of human error.
The nationwide shortage of cybersecurity professionals – particularly for positions within the federal government – creates risks for national and homeland security, according to a new study from the RAND Corporation.
A systematic approach to developing and updating mobile device management (MDM) and Bring Your Own Device (BYOD) policies is critical to assure data protection in a mobile access environment. After you develop and implement mobile security policies, it is important to evaluate and update policies on a regular basis.
Privacy issues have long been a big concern when it comes to cybersecurity, but with major security breaches like the one Target experienced in December 2013
In the event of a breach, you need to have a written plan to take immediate steps and know who is going to analyze the problem, who will notify the people impacted by the breach, and who you can call for help, among other things.