article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Related: Atrium Health breach highlights third-party risks. Third-party cyber risks are likely to persist at the current scale for a while longer. According to a recent Ponemon Institute study , some 59% of companies experienced a third-party data breach in 2018, yet only 16% believe they are effectively mitigating third-party risk.

Risk 147
article thumbnail

This is the old ChiefTech blog.: Case Study: Success at Ernst & Young's Center for Business Knowledge

ChiefTech

Sunday, 20 May 2007 Case Study: Success at Ernst & Young's Center for Business Knowledge I wrote this case study, Online Collaboration Tools, Knowledge Managers, and a Cooperative Culture , in 2003 while working at Ernst & Young in Sydney, Australia, as the Ernst & Young Online Program Manager for Asia.

Paper 46
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Can I really rely on my entire workforce to support a recovery?

IT Governance

Clark ( www.bcm-consultancy.com ), editor of January’s book of the month, In Hindsight – A compendium of Business Continuity case studies , which focuses on business continuity and disaster recovery. Admittedly, not often and organisational risk assessments are likely to reflect that. This is a guest article written by Robert A.

Risk 75
article thumbnail

This is the old ChiefTech blog.: Another Web 2.0 service model risk blown away - Google and Postini

ChiefTech

service model risk blown away - Google and Postini I noticed in this case study about a law firms decision to pick Google Apps for email and collaboration over Microsoft Exchange or IBM Lotus Domino , that they mention Google has acquired a company called Postini (actually back last year ). Sunday, 13 January 2008 Another Web 2.0

Risk 40
article thumbnail

This is the old ChiefTech blog.: An interview with Barney Twinkletoes from Santa about Enterprise Web 2.0

ChiefTech

and a number of interesting case studies have appeared. I can tell you, it was pretty exciting but at the same time we felt it was a do or die situation where we had to come up with some really useful ideas that wouldnt risk our core operations. There has been a lot of talk this year about Enterprise Web 2.0

article thumbnail

This is the old ChiefTech blog.: Is the term "wiki" no longer useful?

ChiefTech

However, its well worth reading Ray Simss analysis of these slides and also another wiki case study, Avenue A | Razorfish. I particularly concur with his comment about " overloading of wiki risks making the term no longer useful as descriptor of an editable web page, but rather confused as a general descriptor for an enterprise 2.0

Paper 40
article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

At its core, malware exploits existing network, device, or user vulnerabilities , posing as little a risk as annoying advertisements to the much more damaging demand for millions of dollars in ransom. By avoiding third-party app stores and investigating app data before downloading, users can significantly mitigate this risk.

Phishing 105