Theme: Cybersecurity Basics | Prevention
#10 | Keeping Things Safe: Device and System Protection
#11 | Access Control Basics: Password Management and Authentication
#12 | Keeping Communications Safe: Networking and Wi-Fi
A Cybersecurity Webinar For SMBs | Episode X
Regardless of how your business is run, it’s a given that there are a number of laptops, desktops, servers, and even mobile devices used as part of your business processes. Understanding how these endpoints fit in to the grand scheme of things can help you optimize your IT and security management programs to manage risk and increase productivity.
Join experts in the field for this need-to-know webcast to learn best practices around:
Managing Risk and Weaknesses at the Endpoint
Managing Access to the Endpoints
Managing Data on the Endpoints
Managed Endpoint Connections to Systems, Applications, and Data
STAY TUNED FOR THE RECORDED SESSION
This video qualifies for 1 CPE. Learn more.
Video coming soon…
On The Go? Have A Podcast...
Sr. Threat Response Engineer
Sean Martin, CISSP