Why Your Business Continuity Plan Should Cover Communication and Office Access

Imagine a scenario where your company’s digital infrastructure goes offline. Your servers are unreachable, the company website is offline, internal communication stops working and employees are locked out of offices because keycard security systems are down. Your entire company—literally everything it does—just stops. It’s a nightmare scenario, but if you’re prepared with a business continuity […]

The post Why Your Business Continuity Plan Should Cover Communication and Office Access appeared first on Security Intelligence.

Continue reading Why Your Business Continuity Plan Should Cover Communication and Office Access

Why We Need To Beat ‘Breach Fatigue’ — At Work and at Home

Data breaches come at such a fast pace that the public doesn’t seem to pay attention to the latest incidents, or they’re practically forgotten in a week — just in time for the next breach to make headlines. Instead of cries for better personal data protection, however, consumers seem less concerned even as more companies […]

The post Why We Need To Beat ‘Breach Fatigue’ — At Work and at Home appeared first on Security Intelligence.

Continue reading Why We Need To Beat ‘Breach Fatigue’ — At Work and at Home

How to Include Cybersecurity Training in Employee Onboarding

Bringing new employees up to speed on company policies and procedures, or employee onboarding, is standard practice. The process covers topics like what’s expected in daily work, proper communication channels and vacation and sick leave policies. In well-prepared companies, it also includes extensive cybersecurity training. Quality employee cybersecurity training, along with ongoing training for existing […]

The post How to Include Cybersecurity Training in Employee Onboarding appeared first on Security Intelligence.

Continue reading How to Include Cybersecurity Training in Employee Onboarding

What to Do When a Ransomware Group Disappears

It’s your company’s worst nightmare: attackers managed to sneak ransomware onto your servers. Now, you’re locked out of every file unless you agree to pay whatever price they’re asking. As if the situation couldn’t get any worse, the attackers disappear without a trace and you can’t even pay their ransom to unlock your files. What […]

The post What to Do When a Ransomware Group Disappears appeared first on Security Intelligence.

Continue reading What to Do When a Ransomware Group Disappears