Loss Management Reports

Infographic: 5 questions to ask when creating a ransomware recovery plan
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Companies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.
Posted: 25 Oct 2021 | Published: 25 Oct 2021

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 08 Feb 2021 | Published: 19 Nov 2019

TechTarget ComputerWeekly.com

Cyber Security 2016 and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 08 Feb 2021 | Published: 18 Apr 2016

TechTarget ComputerWeekly.com

Step-by-step disaster recovery planning guide
sponsored by TechTarget ComputerWeekly.com
EBOOK: IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.
Posted: 29 Mar 2022 | Published: 29 Mar 2022

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to managing paper processes
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.
Posted: 12 Jul 2021 | Published: 12 Jul 2021

TechTarget ComputerWeekly.com

12 top enterprise risk management trends in 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.
Posted: 20 Mar 2023 | Published: 20 Mar 2023

TechTarget ComputerWeekly.com

Computer Weekly – 23 January 2024: Davos 2024 – AI disinformation tops global risks
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, AI-generated disinformation and misinformation will be the top risks for businesses, governments and the public over the next two years, according to the WEF. Intel's CTO discusses the chip maker's plans for the European market. And we examine the dearth of digital skills among elected officials. Read the issue now.
Posted: 22 Jan 2024 | Published: 23 Jan 2024

TechTarget ComputerWeekly.com

Disaster recovery and business continuity: Essential guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.
Posted: 08 Feb 2021 | Published: 31 Oct 2016

TechTarget ComputerWeekly.com

How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction
sponsored by AT&T Cybersecurity
WHITE PAPER: Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

TOPICS:  Risk Management
AT&T Cybersecurity

Encryption Hiding Malware in Half of Cyber Attacks
sponsored by A10 Networks
EGUIDE: A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks