Posts filed under:
CYBERSECURITY-TRAINING
BLOG HOME

Six Steps to an Effective Cybersecurity Plan

Physical security, cybersecurity education, IT/OT separation and outsourcing when necessary are crucial to effective cybersecurity.

A Wall Street Journal article discusses a new set of attacks on electrical distribution providers. These attacks have targeted providers too small to be NERC regulated but may serve a critical infrastructure such as dams or military bases. All but one of the entities that were named in the article says the phishing e-mails were blocked by malicious content filters and were never an issue for them. However, one facility chose not to comment.

Read More

Topics

see all

Signup