Data Security Tips for Remote and Mobile Working (OnDemand Webinar)

$99.00

SKU: 410706EAU

Description

Learn best practices for securing your workspace, wherever your remote workers’ office may be.Cyber actors have and will continue to exploit increased use of virtual environments by government agencies, the private sector, private organizations, and individuals as a result of the COVID19 pandemic. Computer systems and virtual environments are the essential lifeline for many companies and organizations that are conducting regular business remotely. This topic addresses how cyber actors exploit vulnerabilities in these systems to steal sensitive information, target individuals and businesses performing financial transactions, and engage in extortion. And more importantly, what you can do to mitigate the risks of working remotely. If your organization, like so many others, has deployed remote working options, this information provides important best practices for organizations to consider for securing your workspace, wherever your remote workers’ office may be, while meeting your obligations of business operations.

Date: 2023-03-13 Start Time: End Time:

Learning Objectives

Vulnerabilities in Remote Working
• Phishing
• Teleconferencing

Mitigating Risk
• Six Tips for Remote Working
• Insurance Coverage

Policies and Procedures for Remote Work

CPE ,Additional credit may be available upon request. Contact Lorman at 866-352-9540 for further information.

Mason Clark-Ice Miller LLP, Tiffany Kim – Ice Miller LLP

Data Security Tips for Remote and Mobile Working (OnDemand Webinar)

$99.00

SKU: 402902EAU

Description

Learn best practices for securing your workspace, wherever your remote workers’ office may be.Cyber actors have and will continue to exploit increased use of virtual environments by government agencies, the private sector, private organizations, and individuals as a result of the COVID19 pandemic. Computer systems and virtual environments are the essential lifeline for many companies and organizations that are conducting regular business remotely. This topic addresses how cyber actors exploit vulnerabilities in these systems to steal sensitive information, target individuals and businesses performing financial transactions, and engage in extortion. And more importantly, what you can do to mitigate the risks of working remotely. If your organization, like so many others, has deployed remote working options, this information provides important best practices for organizations to consider for securing your workspace, wherever your remote workers’ office may be, while meeting your obligations of business operations.

Date: 2020-07-10 Start Time: End Time:

Learning Objectives

Vulnerabilities in Remote Working
• Phishing
• Teleconferencing

Mitigating Risk
• Six Tips for Remote Working
• Insurance Coverage

Policies and Procedures for Remote Work

Mason Clark-Ice Miller LLP, Tiffany Kim – Ice Miller LLP