Search Results for: business continuity Blog Post Business Continuity Planning May 5, 2020 Disasters are those interruptions that cause the system’s critical information resources to be unavailable for a period of time, which... Blog Post Healthcare Business Continuity in the Age of COVID-19 March 25, 2020 On March 13, Brno University Hospital in the Czech Republic was hit by a ransomware attack and was forced to... Page Project Management as a Service (PMaaS) February 12, 2020 Navigating the information compliance space is a challenge even for seasoned IT Security Executives and Senior Management. Protecting your clients’... Blog Post Is IASME a viable alternative to ISO 27001 certification? July 15, 2021 ISO/IEC 27001 is considered by many to be the de facto international standard on how to manage information security. In... Blog Post Importance of Project Management in Cyber Security April 6, 2020 In today’s era, there is a need for project management skills in the Cybersecurity world. Every Project management team should... Blog Post Business Impact Analysis (BIA) September 11, 2020 Modern-day enterprises thrive on making data-oriented decisions to further their business objectives. Such organizations seek to implement a business continuity... Blog Post Best practices for protecting medical devices against ransomware attacks June 15, 2021 In this day and age, no government, business, or organization is safe from ransomware, not even our frontliners in the... Blog Post Rise of Cybersecurity Threats in Industrial Control Systems September 28, 2021 Long before the widespread of the internet, industrial control systems were inherently safe. They were air-gapped, which meant that no... Blog Post Emails From “WHO” Plant Keyloggers on Your PC March 25, 2020 With the outbreak of coronavirus, emails claiming to be from the leader of the World Health Organization (WHO) are trying... Knowledge Center Cybersecurity Exercises Whitepaper November 3, 2020 Conducting Cybersecurity Exercises According to International Standard ISO 22398 Exercises and simulation activities have been around for decades, if not... Blog Post Increasing Maturity Of Cybersecurity Awareness Programs June 25, 2021 In today’s digital environment, businesses, from small enterprises to established corporations, are constantly exposed to security risks. Most are continuing... Blog Post What Is MTTD And MTTR And How To Improve It? December 2, 2020 The global cyber threat landscape facing businesses is becoming more daunting every year. SecOps professionals are increasingly turning to information-based... Blog Post Corrective Security Controls November 30, 2020 Organizations implement a comprehensive set of security controls to minimize their risks. For security professionals, it is necessary to understand... Blog Post Encrypting your files is not enough for ransomware operators anymore July 9, 2020 Ransomware attacks have become a trend in the malware world, and they are a goldmine for their operators. The usual... Blog Post What Should An Incident Response Plan Contain? November 24, 2020 The threat landscape businesses are facing worldwide has never been as diverse or as harmful. An organization-wide incident response plan...
Blog Post Business Continuity Planning May 5, 2020 Disasters are those interruptions that cause the system’s critical information resources to be unavailable for a period of time, which...
Blog Post Healthcare Business Continuity in the Age of COVID-19 March 25, 2020 On March 13, Brno University Hospital in the Czech Republic was hit by a ransomware attack and was forced to...
Page Project Management as a Service (PMaaS) February 12, 2020 Navigating the information compliance space is a challenge even for seasoned IT Security Executives and Senior Management. Protecting your clients’...
Blog Post Is IASME a viable alternative to ISO 27001 certification? July 15, 2021 ISO/IEC 27001 is considered by many to be the de facto international standard on how to manage information security. In...
Blog Post Importance of Project Management in Cyber Security April 6, 2020 In today’s era, there is a need for project management skills in the Cybersecurity world. Every Project management team should...
Blog Post Business Impact Analysis (BIA) September 11, 2020 Modern-day enterprises thrive on making data-oriented decisions to further their business objectives. Such organizations seek to implement a business continuity...
Blog Post Best practices for protecting medical devices against ransomware attacks June 15, 2021 In this day and age, no government, business, or organization is safe from ransomware, not even our frontliners in the...
Blog Post Rise of Cybersecurity Threats in Industrial Control Systems September 28, 2021 Long before the widespread of the internet, industrial control systems were inherently safe. They were air-gapped, which meant that no...
Blog Post Emails From “WHO” Plant Keyloggers on Your PC March 25, 2020 With the outbreak of coronavirus, emails claiming to be from the leader of the World Health Organization (WHO) are trying...
Knowledge Center Cybersecurity Exercises Whitepaper November 3, 2020 Conducting Cybersecurity Exercises According to International Standard ISO 22398 Exercises and simulation activities have been around for decades, if not...
Blog Post Increasing Maturity Of Cybersecurity Awareness Programs June 25, 2021 In today’s digital environment, businesses, from small enterprises to established corporations, are constantly exposed to security risks. Most are continuing...
Blog Post What Is MTTD And MTTR And How To Improve It? December 2, 2020 The global cyber threat landscape facing businesses is becoming more daunting every year. SecOps professionals are increasingly turning to information-based...
Blog Post Corrective Security Controls November 30, 2020 Organizations implement a comprehensive set of security controls to minimize their risks. For security professionals, it is necessary to understand...
Blog Post Encrypting your files is not enough for ransomware operators anymore July 9, 2020 Ransomware attacks have become a trend in the malware world, and they are a goldmine for their operators. The usual...
Blog Post What Should An Incident Response Plan Contain? November 24, 2020 The threat landscape businesses are facing worldwide has never been as diverse or as harmful. An organization-wide incident response plan...