CONTACTUS

Category Archives: Security

Guide to Cyber Insurance Policies

Guide to Cyber Insurance Policies

Cyber attacks are on the rise. Hackers strike on average every 39 seconds. Yet according to IBM, the average time to identify a breach in 2019 was 206 days! How much damage could be done during that time? Seventy-one percent of those breaches were financially motivated, while 25% were espionage. The average cost of a [...]read more »
WEBINAR: Back to Work

WEBINAR: Back to Work

Is your organization gearing up to bring your remote workforce back into the office?  Before moving forward, you may want to take a step back and make sure you have policies and procedures in place to make the transition as smooth as possible. Some important questions to ask: Do employees feel safe coming back into [...]read more »
The New Global Crime Trend: Bytes Over Bullets

The New Global Crime Trend: Bytes Over Bullets

An American contractor is killed at an Iraqi military base, thought to be caused by Iranian-backed militias. The U.S. responds by assassinating General Qassim Suleimani, one of Iran’s top military strategists. Iran retaliates by launching missiles at two Iraqi bases holding U.S. troops. The U.S. Department of Homeland Security issues a terrorism bulletin warning of […]

read more »
WEBINAR: Activating and Optimizing Your Remote Workforce

WEBINAR: Activating and Optimizing Your Remote Workforce

> Panelists from 10 of the nation's leading IT management firms > Moderated by DKBinnovative's CEO Keith Barthold The Covid-19 crisis and resulting shelter-in-place orders have many businesses with a remote workforce for the first time, and leaders faced with how to manage telecommuting employees. Learn how to manage your remote workforce productively and securely [...]read more »
DOWNLOADABLE TEMPLATE: Employee Work From Home Policy

DOWNLOADABLE TEMPLATE: Employee Work From Home Policy

There are many advantages to working from home — employees don't have the dreaded daily commute and employers may save on some overhead expenses. But a remote workforce brings its own challenges. How can you maintain the same productivity? What cybersecurity vulnerabilities are introduced when employees use their own wifi and join the business network [...]read more »
Five Key Elements of an Effective IT Work From Home Policy

Five Key Elements of an Effective IT Work From Home Policy

Implementing an IT Work From Home Policy is incredibly important, especially today. More employees are working from home than ever before and the practice is trending up. In fact, 81% of businesses are improving employee retention by implementing flexible working, according to a 2019 International Workplace Group study. Well-meaning remote employees, whether working in the [...]read more »
INFOGRAPHIC: COVID-19 Sparks New Phishing Scams

INFOGRAPHIC: COVID-19 Sparks New Phishing Scams

Not only are the number of phishing scams sharply increasing during the coronavirus pandemic, but hackers are also inventing new ways to scam the public. Many of the new threats revolve around exploiting the public’s fear of the virus and the fact that so many people are working remotely.

read more »