Remove Blog Remove Business Services Remove Course
article thumbnail

Take the stress out of planning your training schedule

OpenText Information Management

We know that cancelled training is disruptive to you and your project schedules, so our guaranteed to run courses will not be cancelled regardless of registration volume. We’ve made it easy to identify these classes in our online course calendar. Here’s the scenario. You’ve been approved to take some training.

article thumbnail

UK Suffers Third Highest Rate of Ransomware Attacks in the World

IT Governance

The other most vulnerable sectors were business services (23), construction (22), manufacturing (19) and transport (18). You can find all the guidance you need with our Ransomware Staff Awareness E-learning Course. Across the UK, the education sector was the most frequently targeted, with 24 incidents. Get started.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GDPR Article 28 Contracts: What You Need to Know

IT Governance

You should also check the business/service continuity guarantees. If you’re relying on a third-party service provider to provide you with your data, and that third party suffers an outage – for whatever reason – how does that impact you, as the data controller? Find this interview useful? Looking for a solid GDPR foundation?

GDPR 87
article thumbnail

10 things you must do to become cyber secure

IT Governance

In this blog we summarise its guidance and recommend tools and resources to help you along the way. As such, we recommend that you enrol all employees on annual staff awareness courses covering the essentials of cyber security and specific topics, such as phishing and the EU GDPR (General Data Protection Regulation).

article thumbnail

FCA Publishes Wholesale Banks and Asset Management Cyber Multi-Firm Review Findings

Data Matters

The post FCA Publishes Wholesale Banks and Asset Management Cyber Multi-Firm Review Findings appeared first on Data Matters Privacy Blog. What can we, as a Board or Management Committee, do to make sure the firm’s second line of defence is able to provide effective challenge to the first line on cyber-related matters?

article thumbnail

This is the old ChiefTech blog.: Enterprise Scenarios for Integrating Social Network

ChiefTech

This is the old ChiefTech blog. However, you need to come over and see my new blog at chieftech.com.au. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. at 9:14 AM View blog reactions 1 comments: Doug Cornelius said. Nice of you to drop in and visit. ©2005-2009.

article thumbnail

Don’t blame ‘The Things’

CGI

The Dedicated Denial of Service (DDoS) attack on a number of popular websites that made the news recently was attributed to hackers utilising the vulnerabilities of home automation products such as sensors, TVs and webcams. Blog moderation guidelines and term of use. The list could go on! We could have all done better! .

IoT 40