It’s easy to confuse the terms data protection, disaster recovery, and business continuity. This presentation will provide an overview of the difference between the three. In this session, you will learn how to classify the different types of data and systems and how to protect them while building your business continuity plan.
RecordedJan 20 202131 mins
Your place is confirmed, we'll send you email reminders
It’s easy to confuse the terms data protection, disaster recovery, and business continuity. This presentation will provide an overview of the difference between the three. In this session, you will learn how to classify the different types of data and systems and how to protect them while building your business continuity plan.
This session will review the steps to protecting your assets within your environment. We will review the following:
- Asset management and inventory ranking.
- Open web application security project
- Social engineering with respect to assets and data theft
- Patch management and change management
- Assessing risk within your environment
- Penetration testing and vulnerability management
Security is a top priority for organizations today. Presented by Greg Manson, Director of Security, Audit, and Compliance at Logically, this webinar will help organizations improve their security posture.
Attendees will learn:
Scare tactics organizations are facing
Threats and vulnerabilities that exist in your environment
Steps you can take to minimize the risks of your employees
Collaboration is essential in the workforce today. Even before the COVID-19 crisis, organizations had a need for employees to work anywhere, any time. Microsoft Teams is a cloud-based collaboration app that integrates with Sharepoint, allowing users to chat, call, meet, and share files from anywhere. In this webinar, we will review the benefits of the application.
The Center for Internet Security (CIS) sets the standards for IT security by defining the best practice criteria to reduce risk in your IT environment. Along with NIST and ISO, Logically follows CIS standards and controls as part of our approach to securing your environment.
In this webinar, we will review the Risk Assessment Methodology as directed by CIS. This webinar is presented by Greg Manson, Vice President of Security, Audit, and Compliance at Logically.
While cloud presents a unique set of challenges the payoffs can be incredible. Learn best practices for utilizing the cloud for unprecedented security and scalability at your organization.
Creating a Disaster Recovery and Incident Response plan for your business is a critical part of your security strategy. What happens if you are the victim of a breach or cyberattack? Would you be able to resume business operations in a timely manner? How would your business continue to operate in the face of a disaster?
These questions and more will be answered in this webinar. The webinar is presented by Caleb Pipkin, Security Solutions Engineer, of Logically.
Working remotely means something entirely different in a COVID-19 era. This webinar will review the basics of remote support to ensure your users are prepared to work remotely in a secure manner. We'll also discuss remote access security and how to support home networks. Learn how to set up multi-factor authentication and VPN access for your users as well.
This webinar is presented by Matt Essig, Associate Systems Engineer, at Logically.
Phishing emails are the easiest way for cyber criminals to get into your environment. This webinar will review best practices for phishing. You will see real-world examples of phishing emails and learn more about the impact of clicking on these emails. This webinar is presented in partnership with the Portland Regional Chamber of Commerce. The presenters are Tyler Booker, Senior Auditor, and Jeffrey Bell, Security, Audit, and Compliance Intern, of Logically.
When the COVID-19 pandemic hit earlier this year, many organizations were not prepared to work remotely. By leveraging cloud-based SaaS applications, storage, and servers, Logically’s Professional Services team helped many clients transition smoothly to a remote work environment. In this session, you will learn how to harness the power of cloud technology to allow your employees to work from anywhere.
Learn more about the Professional Services offerings from Logically. This presentation will discuss some of the most common projects we support clients with including Office 365 migrations, network and server refreshes, and office relocations. You’ll also learn more about storage upgrades and migrations to the cloud.
It’s easy to confuse the terms data protection, disaster recovery, and business continuity. This presentation will provide an overview of the difference between the three. In this session, you will learn how to classify the different types of data and systems and how to protect them while building your business continuity plan.
This session will review the steps to protecting your assets within your environment. We will review the following:
- Asset management and inventory ranking.
- Open web application security project
- Social engineering with respect to assets and data theft
- Patch management and change management
- Assessing risk within your environment
- Penetration testing and vulnerability management
This session will review the importance of cyberliability insurance. Today’s policies are much more granular, and it is important to understand exactly what your policy covers. This session will help customers know what improvements to make in their control environment to better align with their policy.
While cloud presents a unique set of challenges the payoffs can be incredible. Learn best practices for utilizing the cloud for unprecedented security and scalability at your organization.
OpLogic is Logically's self-healing Intelligent MSP platform for small and midsize businesses that stops problems before they stop you. In this session, you will learn the benefits of the OpLogic solution and how it addresses the challenges of management in IT. This session will also review the architecture of OpLogic while providing real-world examples of how our clients have utilized the solution.
This session will explore the differences between Incident Response and Disaster Recovery policies. We will review best practices that should be included in both policies including the importance of regular backups. This presentation will include real-world examples of incident response from malware and phishing attacks.
A great IT support provider will help your organization grow, reduce costs and delight your customers. The wrong one will slow you down, waste your money and expose your business to performance and security risks. Learn how to identify shortfalls in your current Managed IT Service Provider and determine if it’s time to switch.
Working remotely means something entirely different in a COVID-19 era. This webinar will review the basics of remote support to ensure your users are prepared to work remotely in a secure manner. We'll also discuss remote access security and how to support home networks. Learn how to set up multi-factor authentication and VPN access for your users as well.
This webinar is presented by Matt Essig, Associate Systems Engineer, at Logically.
Our mission is to enable small and midsized organizations to achieve their business objectives through information technology. To do that, our customers need a trusted IT ally with a wide and deep bench of IT talent with expertise in emerging and critical technologies such as cloud, cybersecurity, Office 365, mobility, and how the modern workplace operates. A trusted IT ally that can deliver reliability and operational excellence at an affordable price. A trusted IT ally like Logically.