Skip to Content

Managing risk in governments

A man frustrated while looking at his desktop computer.
70 min watch
Cybersecurity for the public sector: You've been hacked — now what?

Cyberattacks often target the public sector. This three part on-demand webinar series will help you boost your cybersecurity efforts by figuring out where to start after a data breach, determine how it happened, and how to protect your organization for the future.

Judy Wright
Webinar February 19, 2018 70 min watch
Image of lock and person on computer
4 min read
Cybersecurity is like a sponge: Five ways to safeguard your data
Despite good intentions, IT infrastructure often seems more like a porous sponge than impenetrable vault. Hacks of all types are increasingly common, but these straightforward steps can help prevent them.
Sarah Pavelek
Article June 14, 2017 4 min read
A picture of a man sitting at a desk who is worried and suspects fraud.
3 min read
Suspect fraud? Seven actions to take now
Have that nagging feeling something just isn't right? Conduct the initial analysis to substantiate your suspicions — don't wait any longer to take these important steps to protect your business.
Eric Conforti
Article April 25, 2017 3 min read
A picture of business colleagues discussing the five benefits of cloud-based disaster recovery
4 min read
Five benefits of cloud-based disaster recovery
Are you prepared for an IT disaster? If you think you’re immune, think again. Here's how to get started on your disaster recovery plan and key considerations to weigh when thinking about cloud-based disaster recovery solutions.
Judy Wright
Article February 21, 2020 4 min read

Deep dive: Managing risk in governments

Show:
Show More
No results were found for the criteria provided, please refine your search above.