Is your organization prepared to ensure operations and core business functions during Coronavirus? Here, we cover threats that Coronavirus poses to business continuity and solutions to minimize disruption.
The impact of the Coronavirus continues to change the way many organizations handle their day to day operations. One of the most jarring changes is a shift to remote work. What are some of the challenges, solutions and precautions enterprises should be aware of with remote or telecommuting employees?
Education is particularly attractive to criminals because of the vast amount of valuable data it holds: student and staff information, supplier information, alumni databases, and research data - so, as security experts, what’s to be done to help schools secure their endpoint devices?
New data from Barracuda Networks reveals that hackers are taking advantage of the heightened focus on the COVID-19 vaccine and are increasingly using vaccine-related emails in targeted spear-phishing attacks.
Tulane University police officer who was working security for the George Washington Carver High School basketball team this weekend was shot and killed after he went to help another staff member that was punched by a man trying to enter the game without a mask on.
In the spring of 2020, the second New York Cyber Task Force (NYCTF) was formed under the direction of its Executive Director Greg Rattray, gathering key high-profile members and leading experts to analyze the degree to which the U.S. was ready for future cyber challenges, including political, economic, and technological developments; changing cyber conflict dynamics; and the COVID-19 pandemic. Now, the NYCTF released its new report, “Enhancing Readiness for National Cyber Defense through Operational Collaboration” with Columbia University’s School of International and Public Affairs (SIPA), revealing U.S. cyber response readiness against national security challenges in cyberspace.
In a report titled, “COVID-19 Vaccine Security Assessment,” analysts at G4S detail the security threats – both physical and cyber – associated with vaccine distribution across the U.S. and around the globe.
A new study finds that one in four consumers admit to using their work email or password to log in to consumer websites and applications such as food delivery apps, online shopping sites and even dating apps.
As pharmaceutical companies and healthcare organizations turn their attention from the development to the deployment of coronavirus vaccines, well-resourced cybercriminals are hotly following suit. The vaccine supply chain is rife with logistical complexities making the enormously valuable data on the various vaccines deeply attractive to threat actors. In fact, cybercriminals are already attempting to steal vaccine formulas and disrupt operations.
Potawatomi Hotel & Casino, a 500-room luxury hotel located in Milwaukee, has implemented a touchless security screening for guests that includes temperature screening and weapons detection screening without needing guests to walk through individually as is the case with traditional screening methods.
ON DEMAND: The purpose of contact tracing is well understood, but there are many misconceptions about how it works, who it should apply to, and how to implement it. This webinar will clarify these issues and will recommend specific capabilities that businesses and government organizations should consider when selecting contact tracing solutions.
ON DEMAND: Listen to healthcare security experts as they discuss their journey through the Covid-19 pandemic – from response to recovery, what they saw, and what they learned. This webinar will discuss how these experts reacted to the pandemic, the planning, the changes in their operations and staffing, and dealing with this new unforeseen risk.
ON DEMAND: Right now, in the pandemic environment, business leaders are balancing internal priorities – managing cost and impacts to productivity – with market and external priorities like government requirements, customer needs, and perceived standards of safety and health.
ON DEMAND: In this webinar, we intend to share some real stories. What were your challenges? What solutions did you deploy to address these challenges? What were your results? As part of this webinar, we will also discuss business continuity and resilience and how we can continue to plan for residual risk in a changed world.
ON DEMAND: The insider threat—consisting of scores of different types of crimes and incidents—is a scourge even during the best of times. But the chaos, instability and desperation that characterize crises also catalyze both intentional and unwitting insider attacks. Learn how your workers, contractors, volunteers and partners are exploiting the dislocation caused by today's climate of Coronavirus, unemployment, disinformation and social unrest.