article thumbnail

RIM Month Virtual Colloquium, date and lineup announcement for April 7th 1-3pm EST!

The Schedule

A case study in creating a Getty retention compliant electronic file naming system for Procurement. Buyers could then easily name their files according to department naming conventions, and apply retention without having to take any action beyond filling out the checklist. Jennifer Thompson, J.

article thumbnail

CyberheistNews Vol 13 #22 [Eye on Fraud] A Closer Look at the Massive 72% Spike in Financial Phishing Attacks

KnowBe4

IT Pros Are Loving This Tool: Mailserver Security Assessment With email still a top attack vector, do you know if hackers can get through your mail filters? Spoofed domains, malicious attachments and executables to name a few. This strategy involves using built-in network tools to evade defenses and leave no trace of their activities.