Blog
Incident Response Planning — Tabletop Exercises
Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to this segment of our cybersecurity series. Today's topic is incident response, very specifically tabletop exercises. So an incident response plan is going to include a lot of elements. And if...
Implementing information security policies is no longer a nice-to-have
Implementing information security policies is no longer a nice-to-have in today’s business environment, where data breaches and cyber threats are increasingly common. These policies serve as a framework that guides the management, staff, and users in securing the...
Quick Wins are a Great Way to Gain Positive Momentum
Quick wins are small, early successes that can play a significant role in building momentum and positive energy within a team, especially during challenging periods or at the beginning of a long-term project. They are important for several reasons: Boosts Morale: ‐...
Week 51 Data Breach Report
Week 50 2023 Data Breach Report
Using Direct Routing with MS Teams
Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to this segment of our unified communication series. Today's topic is direct routing with Microsoft Teams. And before I describe what that is, what it means, let me give you a little bit of a...
Security Awareness Training
Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to this segment of our cybersecurity series. Today's topic is security awareness training. In a previous session, we talked about non-intrusive, low-cost ways to implement additional layers of...
Introduction to Focus and Execution
Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to this segment of our leadership series. I wanted to take a few minutes to introduce a topic that we're going to be covering in a series of webinars coming up in Q1 and Q2. The topic is focus and...