Close

The Mile2 website will be down for scheduled maintenance on Sunday, November 20th starting at 3:00 PM EST (15:00 hrs).

OCU Security Principles Chapter 5

Viewing 1 reply thread
  • Author
    Posts
    • #60759
      Jessica Jagerson
      Keymaster

      Discuss key security concerns in 2020 and how are companies/organizations responding to these security affairs.

    • #65253
      Cameron collins
      Participant

      Data breach, misconfiguration, insecure interfaces and APIs, account hijacking, malicious insider threats, and DDoS attacks are among the top cloud security threats that will continue to haunt firms failing to invest in a robust cloud security strategy.

      Back up your data.
      Secure your devices and network.
      Encrypt important information.
      Ensure you use multi-factor authentication (MFA)
      Manage passphrases.
      Monitor use of computer equipment and systems.
      Put policies in place to guide your staff.
      Train your staff to be safe online.

      • #65344
        [email protected]
        Participant

        Yes, training staff can be important. Many companies can be targets of phishing scams. Training employees to be on the lookout for sketchy emails can be very helpful. We train people and then IT will send out random phishing emails and see who follows the policy and who needs a management reminder.

Viewing 1 reply thread
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email [email protected] .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.

 

Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  

 

Accreditations

We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense

USAF

The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission