article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO Business Intelligence

These global events have also underscored the crucial significance of safeguarding our critical infrastructure against domestic or foreign attacks. While these technologies aren’t complete fixes to the problem, they do offer an extra layer of security to protect our vital infrastructure.

Security 131
article thumbnail

Is Your Business Prepared to Recover from a Cyber Event?

CIO Business Intelligence

You’ve invested in state-of-the-art, end-to-end security solutions. You’ve implemented robust security and privacy policies and outlined best practices. The question is: are you prepared to recover from a cyber event? Simply put, organizations must prepare to recover from a cyber event before it occurs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why you can’t ignore cloud security

CIO Business Intelligence

But while the cloud provides more flexible and scalable IT services, it’s also introducing new and vexing challenges around cyber security. The recent attacks on NFPs would seem to highlight many of the security risks being posed by the migration to the cloud. Have their staff been vetted?

Cloud 105
article thumbnail

PowerShell Backup Bitlocker Recovery Password One-Liner

Mick's IT Blog

While writing the solution for a secure and safe deployment of BIOS updates, I had to come up with a one-liner to backup the Bitlocker recovery password to a file named.txt in a secured UNC path. This can be used deployed through SCCM to machines to backup their recovery keys. and 10 operating systems. trim() -ne '' }).Trim()

Backup 83
article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

article thumbnail

Disinfecting drones will clean Atlanta stadium between events

The Verge

Atlanta’s Mercedes-Benz Stadium, home of the Atlanta Falcons and Atlanta United FC, will use a pair of drones to disinfect fan seating and other areas after upcoming events. Two drones will be used, with a third to be used as a backup, ESPN reports. The drones will also disinfect the stadium’s handrails and glass partitions.

Chemicals 114
article thumbnail

Four questions for a casino InfoSec director

CIO Business Intelligence

With the CSO50 Conference + Awards coming to the We-Ko-Pa Casino Resort in Fort McDowell, Arizona, October 2-4, we asked Bill Tsoukatos, Information Technology Director at Fort McDowell Enterprises, which owns the resort, to tell us what it’s like to manage IT security at a casino property.