News

Cyber security incidents have transitioned from potential risks to operational certainties. The constant noise of attempted cyber intrusions, security lapses and IT service events requires all ...
Leadership so they understand the plan and its alignment with other university processes Staff who may become aware of incidents System administrators with direct involvement in the identification and ...
Invest and practice: Grant Oviatt, director of incident-response engagements at Red Canary, lays out the key building blocks for effective IR. The COVID-19 pandemic has highlighted the pressing need ...
The DePauw University Data Incident Response Plan outlines the University’s actions following a data breach or other type of data related incident in order to ensure timeliness of response, compliance ...
Organizations are relying more than ever on technology and information processes and systems to deliver critical operations. Given this operating environment, the occurrence of incidents resulting in ...
It’s almost a no-brainer that all organizations, regardless of their size, need some form of cybersecurity. Cybersecurity not only means that you protect your digital assets against a cyberattack, but ...
In the first in this series of articles on disaster recovery (DR) planning, we examined risk and business impact assessment as the initial building block, and then looked at development of the DR plan ...
An event such as the terrorist attacks of 2001 that toppled the World Trade Center or an electrical blackout that struck the East Coast last year requires more than a response, but a recovery ...
Ransomware is one of the most dangerous cybersecurity threats facing organisations today, yet many are still under prepared when it comes to protecting networks from attacks, and about what to do if ...