Webinar

Understanding Business Email Compromise

Business email compromise (BEC) continues to be a significant threat to organizations of all sizes, resulting in financial losses and reputational damage. In this webinar, we will delve into the various tactics used by cybercriminals to infiltrate email systems, impersonate trusted individuals, and manipulate employees into fraudulent activities.

Securing Healthcare: Be Secure, Not Compliant

Learn the role cybersecurity plays in Healthcare along with the unique challenges presented in the healthcare industry.  Review the regulatory landscape with an overview of HIPAA, HITECH Act (Meaningful Use) together with the newly released HHS Cybersecurity Performance Goals.  Discover how pursuing security leads to compliance.

2023 Webinar Series: Establishing a Strong Network and Systems Management Process

Oftentimes when we think about implementing security, we think about what elevated processes and procedures we need to add to be successful. However, before we can really effect change, we must start with the basics. By building a strong foundation with our daily management, we can ensure our overall security goals become much easier to achieve.

Webinar Series 2023: Strengthening Your Data Backup & Recovery

It’s essential to have robust backup strategies in place to safeguard data and ensure an organization’s continuity. Our webinar aims to provide you with valuable insights and practical tips on enhancing cybersecurity through data backup solutions so that you are prepared in the event of a security incident.

Webinar Series 2023: How to Reduce Your Attack Surface with Device Hardening

This month we discuss the fundamentals of device hardening and what it really means to implement it into your organization. We will present various techniques that can be used to harden your environment, as well as how security baselines can be used to define normal conditions on a network.

Strengthening Your Security: Best Practices for Authentication Policies

Authentication is a critical component of any organization’s security framework. The process of verifying the identity of users and devices is essential in protecting sensitive information and preventing unauthorized access. In this webinar, we will explore the importance of authentication policies, password hygiene and how to choose the right policy for your organization. * As a bonus we will also provide a FREE Authentication Policy template download. 

ClosedPort: Network Management by JSCM Group

ClosedPort: Network Management enlists skilled specialists to protect your network within a comprehensive framework, easily identifying enterprise-wide security vulnerabilities and threat opportunities. By utilizing real-time monitoring and enforcement, we provide NOC and SOC functionality across your network for a fraction of the cost of other solutions.

When Your Microsoft 365 is Breached and How It Happened

Microsoft 365 breaches are our #1 incident response call. The hackers are running rampant with trying to get into this system to steal your data. Most breaches are simply a result of missing components or misconfigurations and can be easily fixed before it’s too late. Join us as we discuss why this situation is so serious and what you can do to help protect your organization.

Making Your Environment More Secure With MFA

An informative webinar about Multi-factor Authentication and how it can give you that additional peace of mind. We all know that passwords can be cracked. With the addition of MFA, you will provide the next level of security in your environment. In this webinar we cover: Overview of MFA, Password Trends and a Live Demo on AuthPoint MFA.