Remove Education Remove Government Remove Tips Remove Webinar
article thumbnail

Cybersecurity Resources for Texas Local Governments

The Texas Record

On Friday, August 16, over twenty local government entities in Texas were targeted by a coordinated ransomware attack. This incident is the most recent in a year marked by cyberattacks on state and local governments across the country. Ransomware Webinar. DIR offers cybersecurity resources to Texas local governments.

article thumbnail

What are you doing for Data Privacy Week?

IT Governance

Data privacy is a concept that governs our everyday lives. It’s why, for the past fifteen years, 28 January has marked Data Privacy Day – an international event raises awareness about online privacy and educates people on the ways they can protect their personal information. appeared first on IT Governance UK Blog.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Getting Certified in Records Management

The Texas Record

The answer is that we don’t – we provide training through classes, workshops, and webinars for which you are given a certificate of completion, but we do not offer something that would be recognized as a professional certification in the field. LGARA Certificate Program. CRA and CRM Certifications. IGP Certification.

article thumbnail

CyberheistNews Vol 13 #14 [Eyes on the Prize] How Crafty Cons Attempted a 36 Million Vendor Email Heist

KnowBe4

Join Roger for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware. Human Rights Groups Olga Lautman reported on a very sophisticated social engineering tactic that completely falsifies Non-Government Organizations (NGOs). or UK government authority."

article thumbnail

CyberheistNews Vol 13 #13 [Eye Opener] How to Outsmart Sneaky AI-Based Phishing Attacks

KnowBe4

This data makes it clear that security awareness training designed to educate users on the need to be continually vigilant, regardless of the device, is critical to an organization remaining protected against attacks. Per the Ecuadorian government, these attacks were fueled by attempts to intimidate the media.

article thumbnail

Preparing for Litigation Before it Happens: eDiscovery Best Practices, Part Two

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars. What is Information Governance? Thanks to Paul Unger, managing partner of the Columbus Ohio office of the Affinity Consulting Group for this tip. But the benefits of data governance don’t stop there.

IT 31
article thumbnail

CyberheistNews Vol 12 #49 [Keep An Eye Out] Beware of New Holiday Gift Card Scams

KnowBe4

In this Mobile-First module, your users will learn what push notification abuse is, how these attacks work, and learn tips on how to respond to a push notification attack. This Week's Links We Like, Tips, Hints and Fun Stuff. Blog post with links: [link]. The investigations showed that the website has earned over EUR 3.7