Hi [[ session.user.profile.firstName ]]

MTI Technology

  • Date
  • Rating
  • Views
  • Securing the Gaming Industry
    Securing the Gaming Industry Alex Winterflood Recorded: Apr 26 2017 30 mins
    Managing user privileges is an important aspect of comprehensive information security. Ideally, employees should only have access to the data and systems necessary to carry out their role. The problem is that unmanaged privileged accounts can lead to all sorts of problems for a business.

    Think of a privileged account as an access-all-areas pass to confidential business data and systems, allowing users to grant broad access rights that often go far beyond what is needed for that job function. Monitoring the actions of users is therefore paramount for security and compliance.
  • Ransomware Wins! User Awareness Doesn't Work! What Do you Do?
    Ransomware Wins! User Awareness Doesn't Work! What Do you Do? Amar Singh & Industry Experts Recorded: Mar 30 2017 55 mins
    Nope this is NOT another webinar on How to Protect Against Ransomware.

    If you reckon that users (yes that includes you and me) are the first line of defence against ransomware! Sorry to break it to you but you are WRONG! We are all humans and we make mistakes and ransomware creators know that.

    You have a choice.Hope and or pray that your awareness training protects your employees and your business from becoming a ransomware victim OR attend this webinar and learn what you can do to protect your business.

    Note: This is not your typical webinar. Cyber Management Alliance’s unique and interactive approach to webinar’s allows everyone to have a say and share their knowledge. The host, Amar Singh firmly believes that every member of the audience has valuable input and that each attendee brings their own context and perspective. So, join in, share and learn.
  • 10 steps to cyber security - managing the privileged user threat
    10 steps to cyber security - managing the privileged user threat Jalal Haji & Steven McCullar Recorded: Mar 23 2017 49 mins
    Managing user privileges is an important aspect of comprehensive information security. Ideally, employees should only have access to the data and systems necessary to carry out their role. The problem is that unmanaged privileged accounts can lead to all sorts of problems for a business.

    Think of a privileged account as an access-all-areas pass to confidential business data and systems, allowing users to grant broad access rights that often go far beyond what is needed for that job function. Monitoring the actions of users is therefore paramount for security and compliance.
  • GDPR is coming, are you ready?
    GDPR is coming, are you ready? Andrew Tang & Neil Thacker Recorded: Dec 8 2016 57 mins
    MTI and our security partner, Forcepoint, are finding the majority of companies still aren’t prepared for the introduction of The General Data Protection Regulation. As a result, we are hosting an educational webinar. Attendees will be taken through key articles that need to be understood prior to May 2018; appropriate organisational and technical controls that can aid compliance with GDPR; and how to demonstrate urgency and quick wins, utilising technology, to senior management. To register your place for this webinar, please fill out your details below
  • Protect Office 365 and your collaborative cloud from ransomware
    Protect Office 365 and your collaborative cloud from ransomware Chris Taylor & Andrew Tang Recorded: Sep 27 2016 29 mins
    Moving applications to the cloud offers great flexibility to organisations and its employees. This transition, though, does require businesses to review the security they have in place to ensure their operations remain secure.

    Many organisations are looking to supplement the content security built into Office 365 with advanced controls to detect hidden and targeted threats, which could ultimately result in a costly data breach.

    There are two challenges with relying on the built in security of Office 365;
    1.You need security which can dissect office files to find hidden malicious code
    2.Anti-malware engines, which update hourly, will miss many of the 12,500 new unique threats per hour. You need security with advanced techniques to discover malware that has never been found before.

    Register for the MTI and Trend Micro webinar as we review how you can secure your cloud environment.

Embed in website or blog