Creating and Managing a Cyber Security Policy: Tips for the SMB

Stephen Cobb, Security Evangelist, ESET
Join Stephen Cobb, Security Evangelist at ESET to discover how:
- Vunerable SMB's like yours really are
- You can establish a cyber security policy for your organization
- You can defend your company-and it's employees partners and customers against online attacks
Many small and medium-size businesses (SMB) operate under the mistaken impression that their size, or the minimal security steps that they have already taken, will protect them from cyber attacks.
Mar 21 2012
56 mins
Creating and Managing a Cyber Security Policy: Tips for the SMB
More from this community:

Mobile Computing

  • Live and recorded (1176)
  • Upcoming (33)
  • Date
  • Rating
  • Views
  • Business computing is changing before our eyes. Physical PCs and servers cannot keep pace with the mobile workforces of today or tomorrow. BYOD (Bring Your Own Device) is no longer a “nice to have”, it is a “must have”. The problem most companies face is providing secure and controllable access – anytime, anywhere – to the data, applications, tools and resources required to maintain an enterprise network. DaaS is quickly becoming the leading solution for companies to adopt a comprehensive BYOD policy while actually increasing security and ubiquitous access. Join Nuvestack, the leader in DaaS technology, for an informative and insightful look at what it really takes to implement and manage DaaS as a BYOD strategy.
  • Every year, businesses are making the decision to adopt a Unified Communications platform. Why? The reason is simple – Unified Communications capabilities save companies time and money, and increases productivity.

    Today’s mobile and resource-challenged workers require more freedom and flexibility in how they communicate with their colleagues, teams, partners and customers. Instant Messaging, Presence, Voice and Video Calling, SMS Texting, and Screen Sharing features enable employees to easily connect with their colleagues, partners and customers. Each of these tools have an associated cost, which can add up quickly per user. By removing the a la carte price tags and contracts and rolling all of the tools into one unified platform, both the business and its employees reap the benefits.

    In this webinar, we will cover the following:

    - Typical per-user spend on Screen Share, Video Conferencing, Presence, and IM tools

    - Why businesses are moving to Unified Communications

    - Features of a Unified Communications system
  • Cutting down on the time taken to complete complex document review cycles allows the modern lawyer to operate at the pace required by their industry.

    Join our webinar to learn top tips for shortening these review cycles without losing document integrity and risking corruption. We’ll also cover what technologies are available to provide a quick and accurate way to improve document review efficiency.
  • With 40% of time at work spent on administrative chores, inefficient communication is a big problem in business. Find out how to use tech to reduce wasted time in meetings, spend less time in your inbox and improve the way your company collaborates.

    About the presenter: Ray Gillenwater is the Co-founder and CEO of SpeakUp (getspeakup.com) an Enterprise Collaboration platform that enables collaborative problem solving and ideation. A student of Communications and a former executive at BlackBerry, Ray will share his experience and recommendations to help improve communication at your company.
  • A lot has changed in the way we communicate for business. A decade ago, most organizations had employees who came to the office every day, used desktop computers and desk phones, and stopped communicating for work when they went home.

    Today, people communicate for work anywhere, anytime, and on any device. Per Forrester, sixty-six percent of employees use two or more mobile devices for work. And according to Frost & Sullivan, nearly 25 percent of employees work from home or the road. What’s more, the desk phone is not the only business device. Based on a RingCentral survey, 35 percent of employees are using their mobile phones for work even when they are in the office. And nearly 80 percent of employees text for business, with 32 percent reporting that they’ve even closed a business deal via text.

    Even with these undeniable business behavior changes, the vast majority of companies haven’t optimized their communications infrastructure for mobile workforces or BYOD.

    Join this webinar to get ahead of the pack and learn the benefits of a cloud communications solution that supports the new world of work.

    •Understand the trends driving mobility and behavior changes in the work place, with Melanie Turek, VP of Research for Enterprise Communication & Collaboration, Frost & Sullivan.
    •Get the real story from a business that has addressed their mobility needs first hand from Adam Fishman, director of growth and operations for Lyft, a community ride-sharing service.
    •Hear how a cloud communications solution is addressing several challenges businesses face in the new work world from Nisha Ahluwalia, VP of product marketing at RingCentral.
  • We all want our families and homes to be safe with the convenience of remote monitoring, but do these smart home security devices really make our families safer or put them at more risk by inviting easier access to our homes electronically via insecure Internet of Things? In a follow-up to HP’s 2014 report on the Internet of (Insecure) Things we explore the security of popular off-the-shelf connected Home Security Systems and discuss various testing techniques we used in our study along with recommendations for manufacturers, developers and consumers.
  • Mobile is changing the way we work in the enterprise. Today’s workforce is demanding the ability to access and share business files from any device. In this webinar learn why Fortune 5000 companies select Syncplicity to achieve the promise of mobile productivity and solve the “Dropbox” problem.
  • From unobtrusive advanced malware detection technologies to automated threat response and actionable mobile-friendly dashboard – manage security from any device, any time, ESET will present new solutions for securing your endpoints and new ways to manage them.
  • Speakers:
    John Koetsier: VP Research; VentureBeat
    Jen Kavanagh: EVP, General Manager (US); Beamly

    Abstract:
    The biggest apps and the most successful enterprises do things differently. Mobile marketing automation is how Subway Surfer improves monetization. It's how Starbucks engages deeper with its customers. And it's how Plants vs Zombies gets you back.

    We surveyed 375 mobile developers with over 900 million monthly average users to find the best mobile marketing automation platforms. Then we analyzed 1.8 million apps in Google Play and the iOS app store, conducted 17 live interviews, and surveyed 19 MMA providers.

    The result is the most complete report on mobile marketing automation available.
  • With 75% of enterprise users reporting that they use their cell phones for making work calls, the inevitable question we must ask is, "can we just run our business on cell phones and ditch the PBX?" In this webinar, we will review the massive changes in the wireless landscape that have made this viable in the past 3 months, the solutions that make it possible and what implications this has for the modern BYOD organization.
  • Channel
  • Channel profile
Network Security Education
To help educate end users about the different option regarding network Security and how the work with Anti-Virus solutions

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Creating and Managing a Cyber Security Policy: Tips for the SMB
  • Live at: Mar 21 2012 5:00 pm
  • Presented by: Stephen Cobb, Security Evangelist, ESET
  • From:
Your email has been sent.
or close
You must be logged in to email this