Webinar Registration:
“9 Critical IT Security Protections EVERY Business Must Have In Place NOW To Avoid Cyber Attacks, Data Breach Lawsuits, Bank Fraud and Compliance Penalties”

Event Details:
When: Thursday, March 17
Session Time: 10:00 am EST
Where: On-Line
During This Webinar You’ll Discover:
- The scary risks of mobile and cloud computing – and 9 Critical policies, procedures and protections EVERY business must have in place NOW to protect themselves; overlook even one and you’re exposing yourself to security breaches, damaging and expensive litigation, employment lawsuits and having confidential company information exposed to competitors, hackers and cyber criminals.
- The #1 security threat to your business that anti-virus, firewalls and other security protocols are defenseless to.
- A SHOCKING truth about bank fraud that most businesses don’t know about that could (literally) wipe out your bank account.
- Why firewalls and anti-virus software give you a false sense of security – and what it REALLY takes to protect your organization against new threats and today’s sophisticated cybercrime rings.
Who Should Attend?
C-Level executives and managers who are concerned about: lost or stolen devices, privacy of confidential information, employment litigation introduced when employees use personal devices to access company data and State and Federal laws that carry heavy fines for lost or stolen data. This is of particular importance for those organizations that handle ANY sensitive data such as credit card and financial information, medical records (or serve clients who have medical records) or who simply want to avoid having their bank account wiped out due to a cyber-attack.
Meet Your Presenter:

Tim Wilkins, co-author of “How To Avoid Being Squeezed By Your So-Called Computer Expert”, has been repairing and maintaining personal computers professionally for the past 32 years and has been helping customers with their IT security for the last 25 years. He has witnessed firsthand the evolution of malware and hacking, from the early PC viruses like Joshi, Datacrime, and Michelangelo, to the big businesses of identity theft and cyber-extortion of today. He is just the type of person to help you separate fact from fiction in a field where there is more fiction than actual fact being spread around with regard to IT security and what the bad guys can and can’t do. He is also the person to show you how to protect yourself and your business without “shooting yourself in the foot.”

