Remove Blog Remove Course Remove Government Remove Video
article thumbnail

Elearning Staff Awareness Course Overview: Ransomware

IT Governance

He also delivers ISO 27001 training courses. Damian recently updated our Ransomware Staff Awareness E-learning Course – a 30-minute, non-technical course that’s suitable for all staff. Why is this elearning course so important? What are the key topics covered in this staff awareness course?

article thumbnail

Secure Together: video conferencing, credential stuffing and eye strain

IT Governance

Maybe you feel less guilty about having a mid-morning video chat with a colleague in lieu of your normal coffee break. The video conferencing platform Zoom has been heavily criticised in recent weeks , amid a series of allegations related to its inadequate cyber security and privacy measures. Cyber attacks. Expert advice.

Security 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sophie Sayer on the IT Governance Partner Programme

IT Governance

The benefits of partnering with us, and our partner-exclusive event IT Governance launched its partner programme in 2017, which now includes more than 400 organisations. And why should organisations consider partnering with IT Governance? What is it that makes IT Governance special? What else can partners expect from the event?

article thumbnail

Security Vulnerability of Switzerland’s E-Voting System

Schneier on Security

This doesn’t stop organizations and governments from using it. And of course, that’s part of the problem! He explains it all in his blog post. Of course, Kuster did not employ a botnet virus to distribute his malware to real voters! He keeps it contained on his own system and demonstrates it in a video.

Paper 128
article thumbnail

Weekly Update 390

Troy Hunt

I'm reminded of the old "fast, good and cheap - pick 2" saying, but there's a lot more nuance to it than that, of course. I mean Table Storage was all 3 of those, just so long as we never needed to restore at all , let alone to a point in time. Or geo-replicate. Or do ad hoc queries and do on and so forth.

Access 81
article thumbnail

Why your IT team needs cyber security training

IT Governance

A cyber security training course will increase your IT team’s awareness of your organisation’s wider defence mechanisms. Our Cyber Security for IT Support Self-Paced Online Training Course looks specifically at a number of these, including: Phishing emails; Poor password practices; Social media; Working from home; and.

IT 96
article thumbnail

AIIM's Information Management Training - Cost, Options, and FAQs

AIIM

In several recent posts, I’ve talked about professional development options for information management professionals and provided guidance on how to determine whether a particular course or certification is a good fit. For the most part, I’ve stayed away from blogging about AIIM's training for two reasons.

ECM 116