Shadow IT: When users take IT into their own hands, even with the most innocent of intentions, you can wind up with calamitous results. We’ll discuss a case study involving an accidental breach at a mortgage company leaking an individual’s private information to the Internet.
Physical Security: Front doors locked, back gate open? IT security involves a lot more than firewalls and password policies.
Responsible Disclosure: What if a security researcher found a vulnerability in your system–you would want them to tell you, right? If your data is breached and contains sensitive information, a responsible disclosure policy is something you definitely want to have in place.
Backups: Data is the lifeblood of your business or organization. In this episode we’ll outline the key questions you want to ask in order to determine if you can actually count on your backups should the ★★★★ hit the fan.