Hawaii Ballistic Missile Alert Mistake: A revelation of HEMA’s security issues
by January 24, 2018 and last updated on February 27, 2018 on
In light of the heated political disputes between North Korea and the United States, a text message sent by the Hawaii Emergency Management Agency (HEMA) left citizens statewide in a panic.
The message was: “BALLISTIC MISSILE THREAT INBOUND TO HAWAII. SEEK IMMEDIATE SHELTER. THIS IS NOT A DRILL.” (more…)
Security Address: 3 Tips for Facing Cybersecurity Threats
by October 3, 2018 and last updated on October 3, 2018 on
Rapid developments in technology have greatly increased the risk of cybersecurity issues from all around the world. Companies, whether big, medium, or small, have been targeted by hackers primarily through malware attacks and phishing scams. As a result, business leaders are starting to realize the need to strengthen their organization’s cybersecurity measures. In this article, we’ll list three measures you can use to ensure the security within your organization.
The New Wave of Cybercrime Trends that Businesses Should Know
by September 28, 2018 on
In an age where organizations and individuals are becoming increasingly reliant on the cloud, internet of things (IoT), and workforce mobility for critical business functions, it is becoming more difficult to keep track of the threats and areas where we are most vulnerable. According to CSO Online, damages caused by cybercrime are estimated to hit the $6 trillion mark by the year 2021. Experts predict cybersecurity spending to exceed the trillion dollar threshold over the next five years. With financial repercussions reaching all time highs, it’s of utmost importance to stay ahead of the curve and take note of the new wave of cybercrime trends that are expected to blight the business landscape for years to come.
How Cybersecurity Affects the Evolving Role of the Corporate Secretary
by September 7, 2018 and last updated on September 13, 2018 on
Rapid digital transformation has encouraged companies to move critical aspects of their business onto electronic platforms. Adopting these new technologies may mean more efficient business processes and an increased operational productivity, but these transformations do not come without risks. In dealing with the advanced technologies of today, traditional security standards may no longer be enough.
The Delicate Systems of Data Storage
by August 1, 2018 and last updated on September 10, 2018 on
A data security breach is any leader’s worst nightmare. Having strategic plans compromised, financial information exposed, or customer data hacked can not only halt operations but damage an organisation’s reputation as well. Because of this, data security and protection have always been considered top priorities of many companies worldwide.
Start Reducing Cost and Improving Board Efficiency Today
Convene is our very own board portal solution. What makes Convene special?
- Enterprise-grade security: encryption, access rights control, device security
- Cross-platform support: native iPad, Android, Windows and Mac apps + web access
- Automatic conversions to PDF to reduce manual conversion
- Real-time private and shared annotations with automatic archives
- Live control of other devices to synchronise pages during the meeting
Convene has many other features to improve boardroom productivity, security, and governance. or learn more about Convene's features >>