Terry will be leading off the regional education conference for Charlotte’s Construction Finance Management Association. Participants are welcome to use this form to follow along with the presentation.
Announcement - 2022 SecureWorld Conference
Terry will be presenting at the 2022 SecureWorld Charlotte conference. Participants are welcome to use this form to follow along with the presentation.
Announcement - CFMA Cybersecurity Workshop
Terry will be presenting at the November meeting of the Charlotte CFMA. Participants are welcome to use this form to follow along with the presentation.
Announcement - SCORE Small Cybersecurity Workshop
Are you curious about Small Business Cybersecurity?
Check out this Free Virtual Lunch & Learn Workshop on Jan 27, 2021 with Terry Ziemniak of North Wonders. Please follow this link to register - https://charlotte.score.org/event/small-business-cybersecurity-lunch-learn-workshop-jan-27-2021
Participant worksheets can be found here: https://forms.gle/251YLqG8ZqzAGC8D7.
Blog - FTC and SBA Guidance on Cybersecurity - Tech Support Scams
Tech support scams are growing in frequency. The good news is that with some user education - instilling a bit of mindfulness and cynicism in your workforce - companies can effectively protect themselves and their employees
Read moreRecording - CISOLive - Being Compliant Does Not Equal Being Secure (HIPAA)
Terry Ziemniak, participated in a panel discussion on HIPAA and HiTrust. This was a board discussion that covered many aspects of cybersecurity and healthcare
Read moreRecording - Cybersecurity for the Modern Business - Overcoming Average
Terry Ziemniak sat with Chad Keith and Bryan Dennstedt to talk about cybersecurity for the modern business.
Read moreBlog - FTC and SBA Guidance on Cybersecurity - Business Email Imposters
A cybersecurity program can’t protect all people and all devices from all possible attacks. Be sure to focus attention, resources, and staff on the most likely cyber events.
Read moreBlog - FTC and SBA Guidance on Cybersecurity - Vendor Security
It can often make sense to outsource services that can be done cheaper, or better, by a third party. Just be sure that your business is aware of the associated risk - and put controls in place to protect yourself.
Read moreBlog - Using Sound Processes to Address Top Cyber Risks
The cybersecurity pillars of people, process, and technology will not function if any of the three are ignored. Organizations must recognize the value of processes as an equal, important part of the cyber triad.
Read moreBlog - FTC and SBA Guidance on Cybersecurity - Phishing
Email-based threats such as phishing will continue to be a top attack vector for fraudsters and hackers. Be sure that your company is protected from this pervasive and evolving threat.
Read moreBlog - FTC and SBA Guidance on Cybersecurity - Ransomware
Ransomware has quickly gained a lot of attention in the cyber world. It has grown into one of the most prolific and profitable attacks online. Here are some key ways to defend your company from this evolving threat.
Read moreBlog - FTC and SBA Guidance on Cybersecurity - Physical Security
The protection of data goes beyond simple bits and bytes. Physical protections must be enabled to ensure that bad guys don’t get a hold of sensitive business information.
Read moreBlog - FTC and SBA Guidance on Cybersecurity - Basics
These tips may be considered Security 101. As you start your cyber journey (or perhaps are assessing your current cyber program), treat it like any great adventure and start from the beginning.
Read moreAnnouncement - Lake Normal IT Professionals Presentation
Terry Ziemniak will be presenting (virtually) at Lake Normal IT Professionals this Friday. He will be facilitating an interactive discussion on how companies can secure their staff that now work from home.
Podcast - "Covid19 - Cyber Impacts for Small Businesses"
Terry Ziemniak, President of North Wonders, was interviewed by Kumar Setty of Zakti Labs.
Read moreBlog - FTC and SBA Guidance on Cybersecurity
All companies are struggling to handle this growing and evolving business risk. However, smaller companies have a unique set of issues that may hinder their success.
Read moreRecording - Panel discussion on 'Securely Working from Home'
In the course of a few weeks, millions of US workers have been transitioned to working from home. This seismic shift has challenged all us to rethink how we do business and has required rapid changes in technologies and processes. However, these changes have also opened up new avenues of attacks for cybercriminals.
Read moreAnnouncement - Lake Normal 1 Million Cups
We are looking forward to presenting at Lake Normal 1 Million Cups this Wednesday.
Announcement - Cybersecurity for Business Leaders
We are proud to partner with the Piper Station branch of Uwharrie Bank in bringing to the community this important presentation.
——————————————————————————————————————————-
As a top concern of many business leaders, cybersecurity conversations must move from the server room to the board room. This presentation will educate leaders on why cybersecurity must be addressed as a business-level risk. Participants will also learn what a mature cybersecurity program looks like and practical steps to implement such a program. Learning Objectives
Review the FBI’s list of most prevalent cyber crimes
Learn how cyber insurance can help protect your business
Discuss why technology alone cannot fix this problem
See what lessons can be learned from high profile cyber attacks • Walk through the steps of a successful cyber attack
Discuss the concept of ‘secure enough’ and what that means for your business