by Eugeniusz Wypior | 14 September 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Resilience Improvement Guide. Part VI – Avoiding phishing attacks. Part 6 – Avoiding phishing attacks A phishing attack is a social engineering tool combined with technology.The most common type is an email that is sent...
by Eugeniusz Wypior | 9 September 2021 | Blog-EN, Newest post
Eugene Wypior Proactive Approach to Incident Response. Part 4 – Practicing your Incident Response plan The last three articles covered the topics of an efficient and effective Incident Response plan, the importance of cross-training your IT / OT teams and the...
by Eugeniusz Wypior | 7 September 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Resilience Improvement Guide. Part V – Using passwords to protect your data. Part 5 – Using passwords to protect your data Passwords are an important step in keeping your and your customers’ information safe and when used...
by Eugeniusz Wypior | 2 September 2021 | Blog-EN, Newest post
Eugene Wypior Proactive Approach to Incident Response. Part 3 – Establishing OT Security Baseline In previous articles, we covered the importance of an IR plan and cross-training of your IT and OT teams. Today we will focus on Establishing OT Security Baseline...
by Eugeniusz Wypior | 31 August 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Resilience Improvement Guide. Part IV – Keeping your mobile devices safe. Part 4 – Keeping your mobile devices safe Here are five tips to help you keep your smartphones and tablets safe: Enable PIN or password protection...
by Eugeniusz Wypior | 26 August 2021 | Blog-EN, Newest post
Eugene Wypior Proactive Approach to Incident Response. Part 2 – Cross-train your teams In the previous article, we wrote about the importance of the Incident Response plan for organisations’ OT infrastructure and legal obligations. Proactive IT/OT...