Data Security Policy

May 17, 2019

DATA SECURITY POLICY. Risk Management Practice Guide of Lawyers Mutual. LAWYERS I LIABILITY INSURANCE COMPANY OF MUTUAL NORTH CAROLINA. INTERNAL THREAT 1. accidental deletion or dissemination of client's files 2. downloading malware or virus 3. exposing server and client files SECURITY AUDIT. Install virus protection software VISITOR & CONTRACTOR PROTOCOL Can office visitors or contractors access secure data PROTOCOL FOR EMPLOYEES LEAVING. If employee is leaving, lock down the data  OFFICE COMPUTERS & SERVERS Create an acceptable use policy for the workplace.

Spotlight

Zimbani

Zimbani works with some of Australia’s largest and well-known companies, many of which are highly risk-averse and complex organisations. We continue to demonstrate thought leadership in Cyber Security topics, provide technical expertise across entire enterprise functions in Threat & Vulnerability Management, Cloud Security, Identity and Access Management and Data Protection. We have a strong reputation for employing forward-thinking, diverse and well respected specialists in the industry. Our end-to-end capability across effective, cost-aware and tangible security services makes Zimbani the right strategic partner for your company.

Other Infographics
news image

What is phishing? How this cyber attack works and how to prevent it

Infographic | February 12, 2020

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment. What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyberattacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated.

Read More
news image

Active directory IT security infographic

Infographic | January 24, 2020

Active Directory is a great technology. In fact I can’t image life without it. It’s pretty easy to set up, with every Microsoft Server release it gains additional options that make life for IT easier. Did you know that only 5% of 1000 fortune companies don’t use AD to organize their environment?

Read More
news image

2020 SONICWALL CYBER THREAT REPORT

Infographic | February 12, 2020

The boundaries of your digital empire are limitless. What was once a finite and defendable space is now a boundless territory a vast, sprawling footprint of devices, apps, appliances, servers, networks, clouds and users. Explore SonicWall’s exclusive threat intelligence to help you better understand how cybercriminals think and be fully prepared for what

Read More
news image

The future of cybersecurity in a digital world

Infographic | February 2, 2020

Data-driven technologies change the way the world works. And the more connected devices flourish, the more cybersecurity matters. There are more digitally connected devices than ever before—and the world is just getting started.

Read More
news image

Necessity and Benefits of IoT Security Best Practices for Businesses

Infographic | February 24, 2022

While the IoT can bring new data and helpful insights, it can also introduce new vulnerabilities into your organization. The size of the IoT market was 15.8 billion in 2021. IoT security market is projected to grow to 18.6 billion in 2022. The market is predicted to nearly double in size by 2025. There were more than 1.5 billion IoT breaches from January to June 2021

Read More
news image

Cyber Security Infographics

Infographic | May 4, 2021

Organisations know cyber security is a major risk; they depend on the Internet and IT systems to communicate with their customers, suppliers, partners and staff.Drawing on our experience in helping senior executives address the key governance and leadership issues around cyber threats, CGI’s Cyber Security Services team have developed a set of actions that senior business leaders can use to focus their organisations on cyber risk readiness.

Read More

Spotlight

Zimbani

Zimbani works with some of Australia’s largest and well-known companies, many of which are highly risk-averse and complex organisations. We continue to demonstrate thought leadership in Cyber Security topics, provide technical expertise across entire enterprise functions in Threat & Vulnerability Management, Cloud Security, Identity and Access Management and Data Protection. We have a strong reputation for employing forward-thinking, diverse and well respected specialists in the industry. Our end-to-end capability across effective, cost-aware and tangible security services makes Zimbani the right strategic partner for your company.

Events