The document provided is an overview of the State Data Breach Law. It is not a substitute for advice from an attorney, but meant to be used as a business tool to help bridge the gap between business, IT and council. I hope you find it helpful. Please let me know if you have any questions or comments.
Read MoreThe document provided is an overview of the State Data Breach Law. It is not a substitute for advice from an attorney, but meant to be used as a business tool to help bridge the gap between business, IT and council. I hope you find it helpful. Please let me know if you have any questions or comments.
Read MoreThe document provided is an overview of the State Data Breach Law. It is not a substitute for advice from an attorney, but meant to be used as a business tool to help bridge the gap between business, IT and council. I hope you find it helpful. Please let me know if you have any questions or comments.
Read MoreThe document provided is an overview of the State Data Breach Law. It is not a substitute for advice from an attorney, but meant to be used as a business tool to help bridge the gap between business, IT and council. I hope you find it helpful. Please let me know if you have any questions or comments.
Read MoreCybersecurity teams have accepted the fact that the best we humans can do is not enough. We need to use computers to help mitigate the risks to our computers. “Defense in depth” or “Layers and layers and layers of protection”, are the security mottos. In addition to the training discussed above, below are additional tools and methods for proactively preventing malware on your network through the email attack vector. A slice of the “security cake” revealing the many layers that need consideration to keep assets safe.
Read More