This video provides an overview of different risk management techniques that can help us understand the diversity of risks and risk tolerances during the COVID-19 pandemic. It is my hope that this will be a tool to help communication about our differences during this time. The analysis provided in the video is an example. The values assigned and weights of those values are meant for example only and not meant to accurately reflect the risks during COVID-19.
Read MoreThis video provides an overview of different social distancing actions taken by people with different risk tolerances during COVID-19. It is my hope that this will be a tool to help communication about our differences during this time.
Read More2 minute awareness video on fraud & cyber attacks related to COVID-19 with instructional overview of steps to protect yourself.
https://www.ftc.gov/news-events/press-releases/2020/03/ftc-data-shows-jump-coronavirus-related-complaints-consumers?utm_source=govdelivery https://www.consumer.ftc.gov/features/coronavirus-scams-what-ftc-doing
https://www.bbb.org/article/news-releases/21903-scam-alert-mandatory-covid-19-test-texts-are-a-scam
https://www.fortinet.com/blog/threat-research/latest-global-covid-19-coronavirus-spearphishing-campaign-drops-infostealer.html
https://blog.knowbe4.com/bad-guys-push-new-covid-19-message-you-are-infected
Read MoreThe document provided is an overview of the State Data Breach Law. It is not a substitute for advice from an attorney, but meant to be used as a business tool to help bridge the gap between business, IT and council. I hope you find it helpful. Please let me know if you have any questions or comments.
Read MoreThe document provided is an overview of the State Data Breach Law. It is not a substitute for advice from an attorney, but meant to be used as a business tool to help bridge the gap between business, IT and council. I hope you find it helpful. Please let me know if you have any questions or comments.
Read MoreThe document provided is an overview of the State Data Breach Law. It is not a substitute for advice from an attorney, but meant to be used as a business tool to help bridge the gap between business, IT and council. I hope you find it helpful. Please let me know if you have any questions or comments.
Read MoreThe document provided is an overview of the State Data Breach Law. It is not a substitute for advice from an attorney, but meant to be used as a business tool to help bridge the gap between business, IT and council. I hope you find it helpful. Please let me know if you have any questions or comments.
Read MoreThis is the first video in a series I call the Pineapple Upside-Down Security Layer Cake Series. This series of videos addresses Malware & Email Inboxes. It provides an explanation of information security and risk management fundamentals.
Read MoreCybersecurity teams have accepted the fact that the best we humans can do is not enough. We need to use computers to help mitigate the risks to our computers. “Defense in depth” or “Layers and layers and layers of protection”, are the security mottos. In addition to the training discussed above, below are additional tools and methods for proactively preventing malware on your network through the email attack vector. A slice of the “security cake” revealing the many layers that need consideration to keep assets safe.
Read More