Topics covered in this newsletter include Incident Response and Current Threats.
Incident Response Policy and Procedures; Current Threats
Backup Guidelines for Institute-Owned Assets and Data
Regular backups are critical for recovering and restoring data that has been lost or stolen. It is important to protect the Institute’s data by backing up your data regularly and…
Ransomware
Ransomware is becoming one of the most widely-known types of cyber attacks today. It is malware that uses asymmetric encryption, or cryptography that uses a pair of keys to encrypt…