Learning Center Article

Log In

Preparedness for a Cyber Incident: Developing an Incident Response Plan, Identifying the Team and Practising

by Other | Baker McKenzie | 06/19/2020

No organisation of any scale presently operates without substantial reliance on information technology – servers, desktops, mainframes, cloud computing infrastructure, supervisory control and data acquisition systems, programmable logic controllers and internet of things devices are but a few of the technologies and systems used in the modern IT environment. Unfortunately, these systems constantly face a range of internal and external cybersecurity threats – from the routine to the advanc...

To read more, please log in

Junto Plus
It’s not enough to acknowledge the threat of ransomware—companies need to be positioned to communicate with threat actors (whether directly or indirectly), contain damage and minimize business interruption associated with this increasingly common form of cyberattack. I talked to David Shear, threat data governance and integration manager of Vigilante, about best practices in preparation and response to ransomware events.
07/13/20 | Junto Plus

HHS Breach Data

Number Reported: 1928

Latest Incident
Capital Nephrology
# of Records:
Type of Breach:
Hacking/IT Incident