working from home

Coronavirus: Tips When Working From Home

With the current situation around Coronavirus, many workplaces and venues made a tough and rightful decision to temporarily close their doors (that is to promote social distancing) based on the recommendations from local and federal health authorities. That means many people are now required to work from home until COVID-19 is under control.

Last week, we shared our risks and recommendations for businesses in the light of the Coronavirus outbreak. Since many organizations elected to have most of their staff work remotely, we feel it is important to provide a few simple yet essential tips for everyone who is working from home.

coronavirus

Coronavirus and Your Business: Risks and Recommendations

Yesterday, the World Health Organization (WHO) classified Coronavirus (or COVID-19) as pandemic. The virus is already impacting many day-to-day activities including mass gatherings (conferences, concerts, sport events) which get postponed, cancelled or moved online (web conferencing).

On the other hand, the organizations worldwide are facing increased pressure due to COVID-19 which is already disrupting business operations of many companies.

The questions is How prepared is your organization for Coronavirus?

60 Plants in 60 Months: ICS Cyber Security Findings & Recommendations

This is an excerpt from Genieall’s speaking session at CanWEA O&M Summit 2020.

Drive up to a facility, the gate is unlocked. Walk into the O&M building and grab a seat. So far, no one has asked your name or for your credentials.

3 cyber security tips for smbs in 2020

New Year New You: 3 Cyber Security Tips for SMBs in 2020

What 2020 will bring directly depends on you… and your perception of cyber security.

We won’t be wrong if we say that large companies with enormous budgets and innovation opportunities have always been a desirable target for cyber criminals.

At the same time, their developed security systems designed to protect against an unauthorized entry strengthen their position in the cyber space (although not 100% of time – that’s a different story).

However, the latest trend is that SMBs are at hackers’ gunpoint nowadays just as (if not more often than) large corporations.

physical security threats

Physical Security Threats (that are often overlooked)

Imagine that you’ve been tasked to secure a server storing restricted information. Some of the tools you will use might include: AI-powered endpoint protection solution, Next-Generation Firewall, network segregation, privileged accounts, MFA etc. Voila! It’s now secure.

You go home happy with a sense of accomplishment only to discover the next morning that someone walked in to the office and took out the drive with that precious data (which may trigger heavy financial losses) and walked away… Brutal!

top 12 nerc cip considerations

Top 12 NERC CIP Compliance Considerations

Please note, this is Part 1 of 2 in the series dedicated to Top 12 NERC CIP Compliance Considerations.

North American organizations that conduct business in the Energy sector are subject to strict compliance requirements of the North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards.

Non-compliance may result in penalties and sanctions (i.e. failed audits and non-compliance can trigger fines and sanctions up to $1M per incident per day).

1 2