The Missing Ingredient in Too Many Cyber Response Plans

The Missing Ingredient in Too Many Cyber Response Plans

By: Mark Hoffman, MBCI, CBCP Recently, a client asked me to review a Cybersecurity Response Plan template that they had purchased from a ‘leading’ research organization.  This 21-page document was intended to be used by my client’s IT department in response to a...
5 Cyber Security Tips for Business Travelers

5 Cyber Security Tips for Business Travelers

Are you a cyber target when you travel for business?   Modern technology has allowed us to take our offices on the road when we travel. However, this is a point when our data can be most vulnerable. We are away from our secure, card access only office buildings,...
How Can You Mitigate Risk On Your Phone?

How Can You Mitigate Risk On Your Phone?

Guest contributor: eTravelSafety Do we understand how to avoid the risk of our devices being compromised?   For most of us, our mobile phones are an extension of ourselves. Our daily routine, interests, personality and vital information are all stored on devices...
An Interview with Michael Gladstone of WeWork

An Interview with Michael Gladstone of WeWork

Podcast: Play in new window | DownloadSubscribe: Apple Podcasts | Google Podcasts | Amazon Music | RSSHow does your organization prepare for crises? Have you been through the planning process thoroughly? In this interview, we speak with WeWork’s crisis and...
An Interview with Michael Gladstone of WeWork

An Interview with Jim Preen

Podcast: Play in new window | DownloadSubscribe: Apple Podcasts | Google Podcasts | Amazon Music | RSS2017 has seen some historic storms in North America and South Asia. There’s been a significant increase in cyber-attacks on major businesses such as Equifax and Uber....