article thumbnail

How to Write Good Incident Response Reports

Lenny Zeltser

It's based on the presentation I delivered at the RSA Conference , which offers more details and is available to you on YouTube. A good report not only answers its reader's questions but also instills confidence in the response and enables the organization to learn from the incident.

article thumbnail

How to Maintain ISO 27001 Certification: 7 Top Tips

IT Governance

How to maintain ISO 27001 certification. You should also provide evidence of this, presenting key performance indicators and interviews with employees and other stakeholders. There is no requirement for how often the management review should take place, but it should be at least once a year and ideally every six months.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Prevent Data Breaches: Data Breach Prevention Tips

eSecurity Planet

With the ever-present threat of data breaches, organizations need to adopt best practices to help prevent breaches and to respond to them when they occur to limit any damage. Also read: Network Protection: How to Secure a Network 2. Your individual business will have to decide how to implement NTA in a cost-effective way.

article thumbnail

Tips for Gamifying Your Cybersecurity Awareness Training Program

Security Affairs

Below are five tips to gamify your cybersecurity awareness training program. It also presents them with a situation where their performance determines their score, and performing well on a quiz might earn them a reward. The post Tips for Gamifying Your Cybersecurity Awareness Training Program appeared first on Security Affairs.

article thumbnail

How to Write a Pentesting Report – With Checklist

eSecurity Planet

We explore the art of writing effective penetration testing reports in the sections below: How to Write a Great Pentest Report in 6 Steps The process of writing a great penetration test report is straightforward and can be covered in six key steps. Some components of a pen test will be mandatory and must be present to provide value.

article thumbnail

How to create a cyber incident response plan when you have a hybrid workforce

IT Governance

In this blog, we take a look at some of the problems you will encounter and provide tips to help you address them. Before the pandemic, an organisation’s incident response team would likely have been office-based, so they could be physically present to address disruptions or contact a remote specialist to investigate the problem.

article thumbnail

New to Remote Working? Tapping Into 6+ Years of Tips for Working from Home

AIIM

And with this change comes some new challenges like – deciding where in your home you should work from, how to deal with the new distractions, and more. So, we thought we’d gather our best WFH tips for those newly remote workers. You'll be on video calls, so you should look presentable. Don't Work in Your PJs.