Simple Steps to Control Risk
Stream this recording multiple times at your convenience.
- $200.00 incl. GST
- PD hours: 1.25
As 30 June approaches it is common to prepare for the impending mayhem that is tax season by running through checklists and proactively streamlining processes to improve workflows and efficiency.
BUT what if you get hacked?
All that preparation may be undone … and at the worst possible time of the year! What can you do to protect yourself and your business?
In this webinar, cyber-security expert Les Bell discusses and demonstrates baseline security practices that will allow you to massively reduce the risk of cyber-attacks on your organisation.
This session will include practical steps you can take to:
• block ransomware attacks
• avoid being hooked by phishing attacks
• manage mobile devices
• minimise software vulnerabilities
• assess the security posture of suppliers and clients
• and more …
Make time to prepare or you may be forced to make time for the consequences.
Webinar Learning Outcomes:
Attendees will be able to understand and identify common cyber-risks which face all businesses today as well as practical steps which can be immediately implemented to manage these potential threats.
All small business owners and their professional advisors. Detailed IT knowledge is not a pre-requisite but some content will address areas relevant to more advanced or security-aware personnel.
Les Bell is a Senior Instructor for Optus Macquarie University Cyber Security Hub, he has been writing, as a journalist and speaking as a seminar presenter, about technology around the world since the 1970’s and securing computer systems since the mid 1980’s. Les is an Adjunct Lecturer at Macquarie University, where he teaches cryptography and information security and he also prepares candidates for the Certified Information Systems Security Professional examination. Les is a CISSP, with the added Information Systems Security Architecture Professional concentration. Les’s work spans information assurance from the internal operation of microprocessors to high-level risk management and governance requirements, a near-unique breadth of experience and expertise.
You will be provided with:
• PowerPoint presentation slide deck
• Supporting documentation
• Webinar Recording to view multiple times for up to 6 months
• An opportunity to ask questions to the presenter