article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

But this also opens up a sprawling array of fresh security gaps that threat actors are proactively probing and exploiting. There’s a glut of innovative security solutions, to be sure, and no shortage of security frameworks designed to help companies mitigate cyber risks. However, this is overkill for many, if not most, SMBs.

Security 201
article thumbnail

AIIM's Information Management Training - Cost, Options, and FAQs

AIIM

AIIM training has a long history, going back to 2001 when AIIM developed the Fundamentals of ECM System Implementation course. It is targeted to experienced records managers and other knowledge workers responsible for information security, privacy, and information management. When Did AIIM Start Offering Training?

ECM 116
article thumbnail

Weekly podcast: Memcached DDoS attacks, Equifax (once again) and Alexa

IT Governance

It says: “Blocking port 11211 is a starting point for defenses and will prevent systems on your network from being used as reflectors. We are committed to regaining the trust of consumers, improving transparency, and enhancing security across our network.”. I’m sorry, Dave. I’m afraid I can’t do that.”. Well, that’ll do for this week.