Developing your incident response plan (ITSAP.40.003)

Developing your incident response plan (ITSAP.40.003)

Your incident response plan includes the processes, procedures, and documentation related to how your organization detects, responds to, and recovers from incidents. Cyber threats, natural disasters, and unplanned outages are examples of incidents that will impact your network, systems, and devices. When you have a proper plan, you will be prepared to handle incidents when […]

read more

How to use the PayPal Pay in 4 microloan program

There’s no need to wait to make essential tech purchases with PayPal’s four payment microloan program. Image: Poike, Getty Images/iStockphoto Technology has a tendency to break at the most inopportune moments, including when you don’t have enough money to cover an essential purchase that can get you back to work. If you need to make […]

read more

7 trends in selling and buying from LinkedIn

Virtual selling tops the company’s fifth State of Sales report, which it says will shape the future of sales. Image: iStock/ipopba Virtual selling is here to stay. That’s the message from LinkedIn’s fifth annual State of Sales report, which posed the question, how much of the change in selling is permanent? “All of it,” says […]

read more

E-commerce: Author says companies should focus on the “seeker,” not the customer

While helping the customer, e-companies should keep the customer’s ultimate goals in mind. TechRepublic’s Karen Roby spoke with Raj De Datta, CEO of Bloomreach and author of the new book, “The Digital Seeker: A Guide for Digital Teams to Build Winning Experiences,” about the book and winning in the e-commerce space. The following is an […]

read more

The seeker, not the customer, is your target audience in e-commerce

The seeker, not the customer, is your target audience in e-commerce Length: 9:34 | May 14, 2021 It’s how really successful companies win big, says author and CEO. Source link

read more

Spotting Malicious Email Messages (ITSAP.00.100)

Handling malicious emails Handle suspicious emails with care. When in doubt, avoid opening suspicious emails and contact the sender by another means (e.g. phone call ) to confirm theycontacted you. Do not click on links provided in emails. If you are being asked to log in to an account for an unsolicited reason, do not […]

read more

Mobile Devices and Business Travellers (ITSAP.00.087)

Threats and risks Mobile devices are a prime target for theft. If stolen, a threat actor may be able to access the information contained on your device and use the device or the information for malicious purposes. Everyone should take precautions to protect their mobile devices when travelling. However, individuals who hold senior positions or […]

read more

Using Encryption to Keep Your Sensitive Data Secure (ITSAP.40.016)

What is encryption? Encryption encodes (or scrambles) information. Encryption protects the confidentiality of information by preventing unauthorized individuals from accessing it. For example, Alice wants to send Bob a message, and she wants to ensure only he can read it. To keep the information confidential and private, she encrypts the message using a secret key. […]

read more

Using Bluetooth Technology (ITSAP.00.011) – Canadian Centre for Cyber Security

Bluetooth-enabled cars By connecting devices to Bluetooth-enabled cars, drivers and passengers can make hands-free calls, send texts or emails, stream music, and connect to the Internet. When you pair your device with your car, your personal information is stored on the car’s system. Your call logs, contacts, and messages, such as texts, emails, or any […]

read more