feature12 steps to take when there's an active adversary on your networkThese steps will help you respond quickly, without letting a crisis turn into chaos.By Mary K. Pratt27 Jan 20229 minsCSO and CISOIncident ResponseBusiness Continuity how-to Tabletop exercise scenarios: 3 real-world examplesBy Josh Fruhlinger and Sarah D. Scalet30 Jun 202115 minsRansomwarePhishingDisaster Recoveryfeature Business continuity and disaster recovery planning: The basicsBy Neal Weinberg25 Mar 20219 minsDisaster RecoveryBusiness ContinuitySecurity brandpostSponsored by NTTSimplify and secure: How Aussie businesses should be operating a hybrid workforceBy NTT 23 Mar 20215 minsRemote WorkBusinessBusiness Continuity feature7 critical IT policies you should have in placeBy Bob Violino 16 Mar 20217 minsInternet SecurityDisaster RecoveryIT Strategy opinionProtecting the supply chain in an era of disruptionsBy Chris Dimitriadis 07 Dec 20205 minsBusiness ContinuityRisk ManagementSecurity feature5 steps to building an effective disaster preparedness planBy Bob Violino 14 Apr 20206 minsBusiness ContinuitySecurity featureHow one healthcare CISO is navigating the COVID-19 crisisBy Dan Swinhoe 06 Apr 20209 minsBusiness ContinuityCareersSecurity feature4 steps to build redundancy into your security teamBy J.M. Porup 24 Mar 20205 minsBusiness ContinuitySecurity ArticlesnewsRansomware strike cripples regional Victorian hospitalsBy David Braue 02 Oct 2019 5 minsMalwareAccess ControlBackup and RecoverynewsAustCyber's Canberra node promises cybersecurity boost for government innovatorsBy David Braue 23 Sep 2019 3 minsMalwareMalwareMalwarenewsGovernment rewriting cybersecurity conversations around consumer focusBy David Braue 12 Sep 2019 4 minsMalwareMalwareMalwarenewsWomen in Security: Improving cybersecurity engagementBy David Braue 04 Sep 2019 5 minsAuthenticationAuthenticationAuthenticationnewsData breaches surge as OAIC records another 10 million record compromiseBy David Braue 28 Aug 2019 3 minsBackup and RecoveryBackup and RecoveryBackup and RecoverynewsRecord Australian BEC, scam losses highlight need for better end-user educationBy David Braue 28 Aug 2019 3 minsMalwareMalwareMalwarenewsASD warns Australia under a "high volume" of password spray attacksBy Liam Tung 08 Aug 2019 3 minsBackup and RecoveryBackup and RecoveryBackup and RecoverynewsM&A activity can create cybersecurity holes, ACSC warnsBy David Braue 07 Aug 2019 3 minsMalwareAccess ControlBackup and RecoverynewsUniversities still need to learn how to get proactive about cybersecurityBy David Braue 06 Aug 2019 3 minsMalwareMalwareMalwarenewsSecurity executives more stressed - but more optimistic - about email threatsBy David Braue 26 Jul 2019 3 minsMalwareMalwareMalwarenewsSingapore government tries a second, expanded bug bountyBy Liam Tung 01 Jul 2019 2 minsMalwareMalwareMalwarenewsCSOs may benefit as CPS 234 tasks boards with financial-services cybersecurityBy David Braue 26 Jun 2019 4 minsMalwareBackup and RecoveryDisaster Recovery Show more Show less View all Resources whitepaper Microsoft 365 Backup For Dummies This 'for dummies' guide explores Microsoft 365 backup and discusses how businesses can achieve an effective backup and recovery strategy. The post Microsoft 365 Backup For Dummies appeared first on Whitepaper Repository. By Veeam 24 Jan 2023Backup and RecoveryBusiness ContinuityMicrosoft 365 whitepaper Conversational Microsoft 365 BaaS for MSPs By Veeam 06 Sep 2022Backup and RecoveryBusiness ContinuityManaged Service Providers whitepaper Three Key Solutions From HPE and Veeam By Veeam 11 Aug 2022Business ContinuityDigital TransformationDLP Software View all Video on demand videoRansomware: Do you pay the ransom? | Salted Hash Ep 19Robert Gibbons, CTO at Datto, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks. 19 Feb 2018 RansomwareBackup and RecoveryBusiness Continuity See all videos Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime Explore a topic Application Security Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI