by admin | Sep 17, 2025 | Uncategorized
If you have been following this post series welcome back and thank you for your support.Hopefully, you have a change to complete the Business Impact Assessment (BIA)exercise and you have recognized the critical systems, critical network, andcritical data of your...
by admin | Sep 17, 2025 | Uncategorized
This week, we are going to look at a case study of a cyber attack that contributed to the hack shutdown 30 Ukrainian substations in 2015. Industrial Control System (ICS) are generally separated from the corporate networks (which are business administrative networks),...
by admin | Sep 17, 2025 | Uncategorized
If you are a returning viewer, welcome back to the 2nd posts of this month and thank you for your support. For this week, let’s have a look on business critical systems. There are three critical systems:1. Mission critical systemsThese are the systems that are...
by admin | Sep 17, 2025 | Uncategorized
Welcome back if you have been following our posts for cyber awareness month last month. If you are new to this post series, welcome and thank you for your support.As you probably realized, IT becomes integral to day-to-day operation of a business, the cost of failing...
by admin | Sep 17, 2025 | Uncategorized
In reality, while rules and requirements about how to handle data don’t automatically make your data safe, they’re necessary. What’s needed can vary depending on the type of work you do, where you are, and how your organization is set up. If your...