Blog
Part 2 — Key Elements of an Information Security Policy
Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to part two in our sequence on the key elements of an information security policy. In part one, we covered the first three elements, the purpose and scope, data classification, roles and...
Key Elements of Your Information Security Policy
Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to this segment of our cybersecurity series. In the last segment, we talked about incident response plans, specifically tabletop exercises. So I wanted to take some time and step back a little bit...
Leadership Series — Part 2 of Focus and Execution
Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to this segment of our leadership series. I wanted to go into a little bit more detail on the session we did on focus and execution just prior to the holiday in anticipation of our webinar that's...
Incident Response Planning — Tabletop Exercises
Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to this segment of our cybersecurity series. Today's topic is incident response, very specifically tabletop exercises. So an incident response plan is going to include a lot of elements. And if...
Implementing information security policies is no longer a nice-to-have
Implementing information security policies is no longer a nice-to-have in today’s business environment, where data breaches and cyber threats are increasingly common. These policies serve as a framework that guides the management, staff, and users in securing the...
Quick Wins are a Great Way to Gain Positive Momentum
Quick wins are small, early successes that can play a significant role in building momentum and positive energy within a team, especially during challenging periods or at the beginning of a long-term project. They are important for several reasons: Boosts Morale: ‐...