Menu
header photo

Blog posts : "cybersecurity"

8 Key Components of a Strong Electronic Communications Policy

 

 

Which electronic communications do you have to consider for such a policy? Email? Social Media posts? VoIP calls? Texting? Chatbot conversations? WhatsApp?

The answer is: All of them.

An Electronic Communication Policy (ECP) is a comprehensive document that clearly expresses your plan and its repercussions. Here is what you need to know to get started.

 

Eight ECP Must-Have Elements

 

  1. Establish proper usage rules.
    Employees must know that all electronic …

Read More

Keep Your Social Media Sites Safe by Following these Three Steps

 

Social Media represents the perfect storm for bad actors: billions of people on sites often less visible than emails or websites.

Today’s post will focus on a phased process that will not only limit your exposure to social media cyber attacks it will keep your online brand presence and reputation intact.

 

Step 1: Start with a Social Media Audit

Google your company name.

  • How many social accounts come up?
  • Is your organization active in each one? Regarding inactiv…

Read More

2 Blog Posts