Remote working may boost productivity, but also leave you vulnerable to attack

Remote working may boost productivity, but also leave you vulnerable to attack

New flexible working practices could pose a security risk to small businesses, with one in five of employees (21%) stating they are most productive when working in public spaces like a cafe or library, but only 18% concerned with the security implications this could have. SMBs therefore face the challenge of keeping their business secure, all the while adhering to the needs and expectations of the modern workforce (…)

vulnerable to attack, boost productivity, Remote working

There are many reasons why a certification can be a valuable career asset

There are many reasons why a certification can be a valuable career asset

career asset, certification

Many people who have experience with computers and information technology (IT), or even just have an interest in the field, have probably found themselves asking a simple question: Should I get certified or not?

There’s essentially no option to enter some professions without obtaining some form or certification or licensure. Most people intending to become a nurse, for example, or a tax accountant, would simply take for granted the requirement to clear certain hurdles that verify knowledge and skills before getting a job.

How to create an effective business continuity plan

effective business continuity plan

business continuity plan, Disaster Recovery, Backup and Recovery
A business continuity plan outlines procedures and instructions an organization must follow in the face of disaster, whether fire, flood or cyberattack. Here’s how to create one that gives your business the best chance of surviving such an event.

The 6 Highest-Paying IT Certifications

The 7 Highest-Paying IT Certifications

If you’re thinking of launching a career in information technology (IT) or of getting certified for something you’re already doing in IT, then there are a host of certifications available that you should consider pursuing. Whether you’re interested in networking, security, or systems administration, you’ll be able to find an IT certification that can help launch or enhance your career.

But let’s be honest: You’re after the big bucks. With that in mind, this article lists the top seven highest-paying IT certifications, what each job pays, and what the work entails.

12 tips for implementing secure business practices

12 tips for implementing secure business practicesBy Help NET Security on 12 December 2016

backup, CXO, insider threat, Internet of Things, passwords, phishing, PoS, strategy, tips

Security experts prepared a list of a dozen tips for implementing secure business practices during the 2016 holiday season.

 

1. Limit temporary worker privileges

Many organizations employ temporary workers during the holidays to address increased demand for their products or services, and backfill employees on vacation. Criminal organizations know this and seek to take advantage of the potential “insider threat,” specifically that temporary workers may be less familiar with corporate policies and practices. Organizations should limit temporary employees’ access to corporate systems based on those individuals’ needs to do their jobs. Therefore, if a criminal successfully social engineers a temporary worker in order to carry out an attack on the organization, the fraudster’s access to sensitive company data will be kept to a minimum.

Organizational Resilience – the big concept these days


by António Relvas on October 27, 2016

What is Resilience in an organization? The definition that is widely accepted is that “organizational resilience” is the “ability of an organization to anticipate, prepare for, respond and adapt to incremental change and sudden disruptions in order to survive and prosper.

Ok, the above definition is a great one, but how to achieve resilience in an organization? This is the tricky part, and there are two ways (that can work).

Why you should consider implementing ISO 27001?

implementing ISO 27001

Many senior executives associate ISO 27001 with IT, but take this out of your mind. ISO 27001 is about information. Is about managing the security risks and threats that can affects integrity, confidentially and availability, and guess what, it is applicable to all organizations.

So, why should you consider implementing ISO 27001?

Implement ISO 22301 Management System

Implement ISO 22301 Management System

ISO 22301 – Business Continuity Management Systems – help organizations, regardless of their size, location or activity, to be better prepared and more confident to deal with any disruptive incident.

 

Disruptive incidents can impact the normal operations of an organization at any time. Implement ISO 22301 Management System helps organizations to be better prepared to manage this disruptive events and to achieve an high level of resilience in a way that can continue to operate during and/or after this events occurs.

ISO 22301 can save your business

The implementation of ISO 22301 is the answer to ensure that operations continue, that products and services are delivered in pre-defined levels, the activities of creating value are protected, and that the reputation and interests of stakeholders are safeguarded whenever disruptive incidents occur.

So when a company is faced with the threat of sudden interruption of its operations, with ISO 22301 implemented that company will be prepared to respond quickly and effectively, for reducing the impact on the failure of services.

Apply the four steps method of ISO 22301 implementation, proposed on training, and implement ISO 22301 in your company. Do not complicate what is

Business Continuity, a plan is not enough!

By Joaquim Pereira on April 23, 2014

Any organization needs a strategy for business continuity. No matter if it is an SME or a Large Enterprise, with one or more physical locations or if it operates on one or more business areas. For sure, some organizations develop more critical activities than others. In some cases, some of these activities may even be directly related with the core business or if not, at least support the major processes that make the chain of value of the business, and drives the organization forward.

Ensuring continuity of the business, if a major disaster occurs, it is not an option, is a need that every organization has to fulfill.

Business Continuity, a strategy inherent in our daily life

by Joaquim Pereira on March 22, 2013

It is common in our daily life and in our nature adopt strategies that allow us to prevent or even mitigate the result of common situations inherent in our daily lives.

In our house we adopt strategies for prevention, detection or response, for example through the installation of an alarm – which aims to deter, detect and guarantee a response by the authorities in case of attempted robbery – the installation of an armored door, a lock reinforced, or even the insurance cover for filling the same. These strategies allow even prevent or mitigate the impact of certain inherent threats, human or environmental, such as theft, fire, flood,

Publication of ISO 22301, the new international standard for business continuity management

Lisbon, PORTUGAL (May 16, 2012) – ISO has officially launched ISO 22301, “Societal security – Business continuity management systems – Requirements”, the new international standard for business continuity management. This standard will replace the current British standard BS25999. Continued operations in the event of a disruption, due to a major disaster, are a fundamental requirement for any organization. ISO 22301, the world’s first international standard for business continuity management (BCM), has been developed to
help organization minimize the risk of such disruptions.