In Cooperation with: and Chapel Hill-Carrboro Chamber
6-Week Webinar Series Schedule
Week 1 Session 1 (6/30/20): SMBs: Critical Security Protections You Should Have In Place Today
This webinar will present current and most prevalent threats. We also give actionable guidance on protections that small-to-medium sized businesses (SMBs) should have in place, if they don’t already.
Week 2 Session 2 (7/7/20): Disaster Recovery, Business Continuity and Data Resilience: now more than ever
This webinar will present how critical it is for SMBs to have a Current Disaster Recovery and Business Continuity Plan outline to help prepare their organizations for both Natural and Man-made disasters and emergency situations. Not only just have a plan, but the periodic testing and updating of such a program. “Chance Favors the Prepared Mind”.
Week 3 Session 3 (7/14/20): The Benefits of a Layered Security Approach
This webinar will present what a Layered Security approach is, as well as mythologies and benefits of having a multiple layers. We go a little past the basics to Planning, implementing, and maintaining your layered security technologies. We also briefly cover the need for layered security as prescribed by some business compliance standards.
Week 4 Session 4 (7/21/20): Next Generation of Identity and Access Management: Password-less with StrongKey & FIDO2
Passwords must eventually die! This webinar will present next generation Access and Authentication: Going Password-less. Yes, as we all know passwords necessary and antiquated method of shows one’s identity. Cyreonix has partnered with StrongKey, a Durham-based organization that has that provides the Hardware/Software combination that manages cryptographic Identity Keys for stronger user access security. We will also introduce the FIDO or “Fast IDentity Online” technology that makes this methodology possible.
Week 5 Session 5 (7/28/20): The Anatomy of Ransomware and what you should know
This webinar will present some of the most prevalent malware in operation, how it targets, executes, and it processes. As ransomware attacks are still increasing at a rapid rate, they are also mutating and changing as they are being discovered by security researchers and authorities. But I’m a small business, cyber attackers aren’t interested in us. FALSE, Ransomware and breaches can hit any organizations, no matter what size. In fact, a small business is desirable because they cannot afford to be down for a long period of time. They are more likely to pay due to lack of resources.
Week 6 Session 6 (8/4/20): Mobile Phishing and Vulnerability – The Facts and the Myths
Mobile phishing incidents occur twice as frequently as physical lost or stolen device incidents. This is because phishing is both different and more problematic on mobile devices, especially in a post-perimeter and work remote world.
When you add mobile into your business equation, phishing extends beyond corporate email into SMS and MMS; messaging apps such as WhatsApp, Facebook (messenger), and personal email.