Remove 2001 Remove Government Remove Security Remove Systems administration
article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

But this also opens up a sprawling array of fresh security gaps that threat actors are proactively probing and exploiting. There’s a glut of innovative security solutions, to be sure, and no shortage of security frameworks designed to help companies mitigate cyber risks. However, this is overkill for many, if not most, SMBs.

Security 201
article thumbnail

AIIM's Information Management Training - Cost, Options, and FAQs

AIIM

AIIM training has a long history, going back to 2001 when AIIM developed the Fundamentals of ECM System Implementation course. You may not know that we developed a 4-day Email Management class in 2008 or a 2-day Social Media Governance course in 2011. When Did AIIM Start Offering Training? Which Training is Right for Me?

ECM 116
article thumbnail

Weekly podcast: Memcached DDoS attacks, Equifax (once again) and Alexa

IT Governance

Hello and welcome to the IT Governance podcast for Friday, 9 March 2018. It says: “Blocking port 11211 is a starting point for defenses and will prevent systems on your network from being used as reflectors. We are committed to regaining the trust of consumers, improving transparency, and enhancing security across our network.”.