How to Create a Social Engineering Incident Response Plan?

Hello, What’s cross your mind when talking about Security? Most of IT professionals and users when thinking about Security are primarily concerned about technical aspects, for instance: strong passwords’ policies, Three Authentication Factors, Firewalls, Anti-Phishing, AntiMalwares, and so on. Of course, those are really important and can make a difference in terms of relative protection. Why I’m saying:…

2

How to Explain What is Cloud Computing for your Grandma?

Cloud or Cloud computing is a term that has dominated the media. Even those who do not work directly with technology must have heard it too. It's hard to spend a day without hearing someone comment on. And you? What do you mean by cloud computing? Recently, a friend who works in the area, said:…

0

Best Practices for Meetings using Skype for Business – Large Audiences

Hello ladies and gentlemen, When you’re scheduling your Skype for Business (Lync) Meetings, you can use the default options, which are appropriate for small and casual meetings with coworkers. It’s a good idea to modify the options if: You’re inviting more than 10-15 people. You can have up to 250 participants. You want to control…

0

How to build a Security Awareness program? Microsoft Security Awareness Toolkit – FREE!!!

Hello, Security isn't a destiny itself but it's a journey. How is your company preparing end users to make a safer journey through this high threat cyber road? Information security awareness and training is critical to any organization’s information security strategy and operations. People are in many cases the last line of defense against threats such…

0