article thumbnail

Education Sector OnDemand | Authentication for the Evolving Campus Community

Data Breach Today

Smart & Adaptive MFA for the Modern Campus View this webinar as we discuss multi-factor authentication for the evolving campus community.

article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protecting Sensitive Company Data: How to Educate Employees

AIIM

In this article, we will examine how to educate your employees so that a lethal hack does not disrupt your business. Using, for instance, 2 factor authentication can increase the security wall dramatically and is usually easy to implement now that almost all working people have smartphones. It’s All About Passwords. Want to learn more?

article thumbnail

Webinar: Stop Beating Yourself Up!  And Move Toward Achieving Authenticity via the Mid-Michigan ARMA on 12/19 at 12pm Eastern

IG Guru

This time of year can be stressful and challenging, so we’re bringing you something a little different with this month’s program. There are times during our careers that we beat ourselves up and doubt our abilities more than our supervisors and peers would ever do. This negative attitude will reflect on your work when you […].

article thumbnail

Cybersecurity Resources for Texas Local Governments

The Texas Record

Ransomware Webinar. The Texas State Operations Center released a 56 minute educational webinar on protective measures and response activities related to ransomware. Enable multifactor authentication, especially for remote logins. Create strong unique passwords that are changed regularly.

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Four: eDiscovery Best Practices

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars, including our webinar last Thursday ( Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018 ), which was great. This supports authenticity and counters arguments that it was forged or manipulated.

article thumbnail

To Make the Internet of Things Safe, Start with Manufacturing

Thales Cloud Protection & Licensing

As an increasing number of connected devices are deployed within IoT ecosystems, enterprises need to identify and authenticate them. Injecting digital birth certificates to enable device identification and authentication. Therefore, manufacturing is the first critical link in the chain to establish trust across the IoT.