Data Destruction Assessment
Double Check (Verifying Wire Transfers)
This micro-learning module emphasizes the importance of verifying wire transfers.
The Art of Cyber War: Data Retention
Hackers depend on poorly defined data retention policies and bad policy compliance for opportunities to exploit and steal data.