<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1870732089876948&amp;ev=PageView&amp;noscript=1">

Cloud Security Video Series

Part 1: How to Vet a Cloud Solution to Ensure It Meets Your Security Standard

Mitch Greenwald | CloudbakersGuest Speaker: Mitch Greenwald, Founder of Cloudbakers
View Recording Here

When selecting a cloud solution, it is important to protect key areas of business & choose a solution that addresses all of your security concerns. Legal standards, the nature of your data, employee preferences--many angles come into play. Learn how to identify key aspects of cloud solutions that will help you select an appropriate, secure option for your business.

Part 2: 2 Steps to Enabling 2-Factor Authentication

David Speicher | Aspire IndianaGuest Speaker: David Speicher, Aspire Indiana
View Recording Here

Hackers are relentless--it is safe to assume there is constantly someone trying to get your passwords. If they succeed, the consequences can be catastrophic. While not everyone has the money for password managers or time for extensive courses in cybersecurity, everyone can easily implement 2-Factor Authentication. Join us on the 4th to find out what it is, how to implement it, and why this is the right first step for security.

Part 3: Phishing Attacks & Online Malware

Christiaan Brand | Google SecurityGuest Speaker: Christiaan Brand, Google
View Recording Here

Organizations have been under attack across industries. This is no new phenomenon, but it is an increasing one. Simply clicking a link in a phishing email can lead to an entire business being shut down until they agree to pay a sum of money (ransomware). Learn how to mitigate such risks and stay ahead of the malware curve with a Google Security Specialist in our third session.

Part 4: Data Loss Prevention: Controlling the Cloud

Michael Praino | BetterCloudGuest Speaker: Michael Praino, BetterCloud
View Recording Here

Data security goes much deeper than 2-Step Verification & a backup policy. Organizations serious about retaining and protecting all of their data should consider Data Loss Prevention (DLP) policies that ensure total data recovery in the case of an emergency. These advanced data security solutions will be explained in full in our final session, including first-hand experiences from clients currently implementing them. 


Sign up here for future sessions:

How does Google handle security?

Take a tour of Google's data centers below.