The Federal Deposit Insurance Corporation (FDIC) today announced that JustProtect was one of six teams chosen to participate in a ‘tech sprint’ designed to explore new technologies and techniques to determine how well community banks, and the banking sector as a whole, can withstand a major disruption of any type.
“My father used to have an Attarr (natural perfume oil) shop”, Nanny recalled. She raised me on tales of how she, as a little girl she was allowed to be in her father’s shop to help with customers and even listen in on business meetings. When I questioned how she learned English, she told my sister and me that she taught students English in a local college. We didn’t question these stories; however, they seem extremely progressive for a pre-partition 1930’s India.
JustProtect is excited to announce that it has been considered an innovator that's "heating up" Tampa Bay's tech and startup scene.
It was reported that contractors in China used by Microsoft to train Cortana, their AI engine, were granted access to voice recordings with minimal cybersecurity controls. A former contractor told the Guardian that workers were not vetted and shared account credentials were able to be used on personal laptops.
Preparing for Risk
JustProtect is known for our ability to make cybersecurity and vendor risk assessments easier. But we, just like everyone else, have broader concerns from a risk perspective.
When COVID-19 arrived on our shores, it forced a large portion of the country's employees to work from home. While the majority of our team already worked remotely, we still needed to advise one of our office locations to work from home.
How are Cybersecurity Experts thinking about COVID-19?
From the time that I started my Cyber, or Information, Security in the early 2000's career one of the fundamental tenants that was drummed into me was that human safety and security is placed higher than the safety and security of data and technology.
Throughout its history, the Department of Defense (DOD) has relied on contractors, these are individuals or non-federal companies that supply services, supplies, or construction. Almost all of these relationships involve the sharing of sensitive information which could present some sort of risk.
You've probably heard how important vendor management is to the success of your information security program. But it's important that you learn how to start a vendor management program and perform assessments for it so that each assessment supports your business.