by Brian Leakey | May 17, 2023 | Security
You are the Information Security Director for a medium sized company. You recently experienced a ransom-ware attack that cost the company $500,000.00. After the attack your CEO held a meeting and informed you and the other IT professionals that it “WILL” not happen...
by Brian Leakey | May 16, 2023 | Security
Part 1: Research Remote Access Policies (0/1 completed) Note: In this part of the lab, you will review internet resources on remote access policies in order to form a basis for their purpose and usage. Understanding the reason behind a remote access policy is key to...
by Brian Leakey | May 4, 2023 | Security
Pick one area of security that interests you and discuss the career opportunities that presently exist.
by Brian Leakey | May 4, 2023 | Security
What are the differences between proprietary and contractual security services?
by Brian Leakey | May 3, 2023 | Security
In the news we are constantly hearing about security breaches, invasion of personal privacy, and the increasing prevalence of our digital footprint. The increased availability of digital information presents concerns and challenges of privacy, accuracy, intellectual...
by Brian Leakey | Apr 25, 2023 | Security
In 100-200 words, please explain Cybersecurity Resilience and why it is necessary for organizations.In 100-200 words, please explain Risk Management and how Risk is assessed.
Recent Comments