Join us for an educational webinar on the new general assembly statute Section 7, 143-805, which introduces significant regulation regarding the use of government devices. Hear how we created a solution for City of Kannapolis to tackle this new statute with a live demo and road map to compliance.
Understanding Business Email Compromise
Business email compromise (BEC) continues to be a significant threat to organizations of all sizes, resulting in financial losses and reputational damage. In this webinar, we will delve into the various tactics used by cybercriminals to infiltrate email systems, impersonate trusted individuals, and manipulate employees into fraudulent activities.
Securing Healthcare: Be Secure, Not Compliant
Learn the role cybersecurity plays in Healthcare along with the unique challenges presented in the healthcare industry. Review the regulatory landscape with an overview of HIPAA, HITECH Act (Meaningful Use) together with the newly released HHS Cybersecurity Performance Goals. Discover how pursuing security leads to compliance.
2023 Webinar Series: Establishing a Strong Network and Systems Management Process
Oftentimes when we think about implementing security, we think about what elevated processes and procedures we need to add to be successful. However, before we can really effect change, we must start with the basics. By building a strong foundation with our daily management, we can ensure our overall security goals become much easier to achieve.
Webinar Series 2023: Strengthening Your Data Backup & Recovery
It’s essential to have robust backup strategies in place to safeguard data and ensure an organization’s continuity. Our webinar aims to provide you with valuable insights and practical tips on enhancing cybersecurity through data backup solutions so that you are prepared in the event of a security incident.
Webinar Series 2023: Vulnerability Policies & Best Practices
Webinar Series 2023: How to Reduce Your Attack Surface with Device Hardening
Strengthening Your Security: Best Practices for Authentication Policies
Authentication is a critical component of any organization’s security framework. The process of verifying the identity of users and devices is essential in protecting sensitive information and preventing unauthorized access. In this webinar, we will explore the importance of authentication policies, password hygiene and how to choose the right policy for your organization. * As a bonus we will also provide a FREE Authentication Policy template download.
How to Properly Document User Access
Establishing Third-Party Risk Management Standards
ClosedPort: Network Management by JSCM Group
ClosedPort: Network Management enlists skilled specialists to protect your network within a comprehensive framework, easily identifying enterprise-wide security vulnerabilities and threat opportunities. By utilizing real-time monitoring and enforcement, we provide NOC and SOC functionality across your network for a fraction of the cost of other solutions.
Hacking The Supply Chain
When Your Microsoft 365 is Breached and How It Happened
Microsoft 365 breaches are our #1 incident response call. The hackers are running rampant with trying to get into this system to steal your data. Most breaches are simply a result of missing components or misconfigurations and can be easily fixed before it’s too late. Join us as we discuss why this situation is so serious and what you can do to help protect your organization.
The State of Ransomware Webinar in 2021
Making Your Environment More Secure With MFA
An informative webinar about Multi-factor Authentication and how it can give you that additional peace of mind. We all know that passwords can be cracked. With the addition of MFA, you will provide the next level of security in your environment. In this webinar we cover: Overview of MFA, Password Trends and a Live Demo on AuthPoint MFA.