Browse through a collection of more than 100 articles and model forms in the MCIT Resource Library.
Use the search tools to the left to narrow in on the appropriate resource.
5 Articles found
|
Data Security (Data Compromise and Cyber-security)
September 2019 | PDF | Uploaded in:
Quick Takes are scripts that serve as short talks to remind staff about safe practices related to data security. This Quick Take focuses on safe Internet browsing: recognizing and avoiding suspicious links and websites, and methods to identify secure website. Supervisors typically give the Quick Take talks during regularly scheduled or informal meetings.
September 2019 | PDF | Uploaded in:
Quick Takes are scripts that serve as short talks to remind staff about safe practices related to data security. This Quick Take focuses on what phishing and social engineering are, common attacks and methods to identify and avoid them. Supervisors typically give the Quick Take talks during regularly scheduled or informal meetings.
September 2019 | PDF | Uploaded in:
Quick Takes are scripts that serve as short talks to remind staff about safe practices related to data security. This Quick Take focuses on the best practices for mobile devices relative to secure data. Supervisors typically give the Quick Take talks during regularly scheduled or informal meetings.
September 2019 | PDF | Uploaded in:
Quick Takes are scripts that serve as short talks to remind staff about safe practices related to data security. This Quick Take focuses on the importance of secure data storage and destruction of sensitive data. Supervisors typically give the Quick Take talks during regularly scheduled or informal meetings.
September 2019 | PDF | Uploaded in:
Securing private data is a significant responsibility for local governments. Maintaining data security in the face of real threats, such as hackers, activists and employee errors, is a challenge that everyone in the organization must work to overcome. "Essentials of Data Security for Public Entities" should be used to stimulate conversations among your organization’s leadership and provide them with strategies to help your organization secure private data, whether it is electronic or paper in format.