Where We Stand -
This year kicks off against the backdrop of the security flaw found in Log4j, a system-logging code library widely used in applications and services across the Internet. In the aftermath of this crisis, a...more
2/10/2022
/ Chief Information Security Officer (CISO) ,
Corporate Governance ,
Cyber Attacks ,
Cybersecurity ,
Data Protection ,
Data Security ,
Email ,
Information Technology ,
Popular ,
Ransomware ,
Remote Working ,
Risk Management ,
Small and Medium-Sized Enterprises (SMEs) ,
Supply Chain ,
Technology Sector ,
Training
Tailgating is a physical security breach in which an unauthorized person gains access to a building or other protected area, usually by waiting for an authorized user to open and pass through a secure entry and then following...more
2/26/2020
/ Best Practices ,
Confidential Documents ,
Data Breach ,
Data Security ,
Employer Liability Issues ,
Information Governance ,
Information Technology ,
Malware ,
Risk Mitigation ,
Security Breach ,
Security Standards ,
Sensitive Business Information ,
Sensitive Personal Information ,
Social Engineering ,
Verification Requirements