Key Cyber Security Lessons from the 2020 Twitter Hack

2020 Twitter Hack

What can your company learn from the recent Twitter hack

On July 16, the social media platform Twitter experienced one—if not the most significant—security breaches in its history when cybercriminals hacked into major public figures’ verified accounts and convinced users worldwide to transfer them nearly $120,000 in bitcoin. What can other organizations learn from this Twitter hack?

Read More

Steps to ensure your Disaster Recovery Plan

Steps to ensure your Disaster Recovery Plan

Are you prepared for the next disaster?

There’s no telling when disasters will occur. The next disaster – a new epidemic, data breach, earthquake, or flood – could compromise data, result in lost business, or prevent employees from accessing a physical office. How quickly will your firm be ready to continue operations seamlessly? We have all experienced a change in the way we work. All organizations need to have a solid disaster recovery plan and protocols in place to recover from a breach or disaster, ensure the continuity of business, and allow employees to work from home efficiently.

Read More

ISO 27000 Demystified

LADMF featured

ISO what?

The ISO (International Organization for Standardization) and the IEC (International Electrotechnical Commission) provide a globally recognized framework for best-practice information security management: the ISO/IEC 27000 family of mutually supporting information security standards (also known as the ISO 27000 series).

The most well-known of the series is ISO 27001, which sets out the specification for an ISMS (information security management system).
The series is developed and published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).

Read More