After an incident is not the time to review your bomb threat preparedness plan. Work with local law enforcement and first responders, as well as internal stakeholders and partners, to develop a more comprehensive, confidential bomb threat response plan.
More than three-quarters of U.S. citizens are concerned about the privacy and security of their personal digital data, and almost two-thirds say they would feel more confident if government agencies with which they interact had stronger data-privacy and security policies.
While the shortage of cybersecurity staff continues, many enterprises are now looking for less volume and for more specialization.Companies need specialists who are well-versed in the threats aimed at the business's environment.
According to a Pew Research study, the vast majority of Americans keep track of their passwords using much more traditional methods – specifically, by memorizing them or by writing them down on a piece of paper.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!