Tip 1: Use 2FA (MFA) Use two factor authentication on your email accounts and other important internet accounts. Don’t have…
Welcome to my site, let’s learn some cybersecurity! If you are here, it is probably because you scanned my QR…
Data Breach Notification Laws by John Bandler A data breach is the unlawful access of an organization’s or person’s data.…
Prepare for and plan against a cyberattack By John Bandler Originally published in the July 2018 ABA Journal, and now…
Information governance committee by John Bandler An information governance committee is a group of individuals designated to help manage information…
The NIST Privacy Framework by John Bandler The NIST Privacy Framework (CSF) is valuable guidance for organizations on privacy, free…
Resources for the book: Policies and Procedures for Your Organization Build solid governance documents on any topic … including cybersecurity…
The FTC Act and the FTC by John Bandler The Federal Trade Commission Act (FTC Act) is an important piece…
Information asset inventory details by John Bandler This article covers some details on creating and improving your organization’s information asset…
Information security coordinator by John Bandler An information security coordinator is a person designated to be in charge of information…