Huntleigh Videos

Active Listening Part 2 of 8 — Non Verbal Cues

Active Listening Part 2 of 8 — Non Verbal Cues

Hi, everyone, Scott Munden here from Huntleigh Group. Welcome to part two in our eight part series of shorts on active listening in. In part one, we covered full attention. Part two is nonverbal cues. If you recall in part one, we discussed body language, which is...

read more
Part 1 of 8 on Active Listening — Full Attention

Part 1 of 8 on Active Listening — Full Attention

Hi everyone, Scott Munden here from the Huntleigh group. Welcome to part one of our eight part series of shorts on active listening. We had gotten some feedback from our previous posts related to active listening, so we decided to do a little bit more of a deep dive....

read more
Some Guidelines on Preparing to obtain Cyber Insurance

Some Guidelines on Preparing to obtain Cyber Insurance

Wondering how to prepare your business to obtain Cyber Insurance? Here are some general guidelines: Understand Your Risk Profile: Assess the cyber risks specific to your business. This includes understanding the type of data you hold (personal, financial, etc.), your...

read more
Part 4 — Key Elements of an Information Security Policy

Part 4 — Key Elements of an Information Security Policy

Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to part four and the final sequence in this segment on the key elements of an information security policy. These are elements 10, 11, and 12, which are awareness and training, review and audit,...

read more
Part 3 of Key Elements in an Information Security Policy

Part 3 of Key Elements in an Information Security Policy

Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to part three in our sequence covering the key elements of an information security policy. Parts one and two, we covered one through six. Today, we're going to cover seven, eight, and nine, which...

read more
Part 2 — Key Elements of an Information Security Policy

Part 2 — Key Elements of an Information Security Policy

Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to part two in our sequence on the key elements of an information security policy. In part one, we covered the first three elements, the purpose and scope, data classification, roles and...

read more
Key Elements of Your Information Security Policy

Key Elements of Your Information Security Policy

Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to this segment of our cybersecurity series. In the last segment, we talked about incident response plans, specifically tabletop exercises. So I wanted to take some time and step back a little bit...

read more
Leadership Series — Part 2 of Focus and Execution

Leadership Series — Part 2 of Focus and Execution

Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to this segment of our leadership series. I wanted to go into a little bit more detail on the session we did on focus and execution just prior to the holiday in anticipation of our webinar that's...

read more
Incident Response Planning — Tabletop Exercises

Incident Response Planning — Tabletop Exercises

Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to this segment of our cybersecurity series. Today's topic is incident response, very specifically tabletop exercises. So an incident response plan is going to include a lot of elements. And if...

read more