91制片厂

Tagged - COVID-19

Cybersecurity Priorities Checklist Tool

This tool will help you filter out controls from a predefined list of primary, secondary, and tertiary priority domains and help you visualize a final list of initiatives...

Checklist for Securing Remote Workers

Use this checklist to ensure that you are implementing all of the IT security best practices when you are working from home or away from the office.

Data and Analytics in the Time of Pandemic

Management guru Peter Drucker famously said that 鈥測ou can鈥檛 manage what you can鈥檛 measure,鈥 and of course to be successful you need to first define what success looks like....

Instant Messaging During the Pandemic: How to Embrace Your Collaboration Tools Without Over Doing It

All types of collaboration tools have become essential in the wake of COVID-19 and the mass shift to work from home, but some, like instant messaging, present challenges....

Rise of the Robots: Automatons Deployed Alongside Healthcare Workers in the Front-Line Battle Against COVID-19

In the real world of 2020, humanity faces a global threat posed by the novel coronavirus. To fight COVID-19, we are calling upon robots to disinfect hospitals and other...

SARS-CoV-2: Virus Pathology, Treatment Strategies, and More

What do we know about the novel coronavirus? In this note, we summarize what we know about the pathology of SARS-CoV-2, the treatment options currently available, and the...

Cybersecurity Maturity Model Certification (CMMC) 鈥 Should DoD Contractors Prepare Amidst COVID-19?

A note offering guidance to organizations that have, or endeavor to have, a contract relationship with the United States Department of Defense (U.S. DoD) amid the new...

Running Critical Enterprise Applications Efforts During COVID-19

An enterprise application selection or implementation has most likely been heavily impacted by COVID-19. Do not hit the brakes; stopping and restarting projects increases...

Monitor Remote User Activity via SIEM

The COVID-19 pandemic is an opportunity for cybercriminals as organizations reduce focus on security protocols due to time-sensitive remote access initiatives. SIEM can...

Running Change Management During a Crisis

IT changes are inevitable, even in a crisis mode. Service Desk and IT operations will feel overburdened, but when it comes to change management, skipping steps for...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us