BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20200923T140000Z
DTEND:20200923T150000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Best Practices for Securing Your Home Office
DESCRIPTION:The ability to work from home is a prized and now often compulsory employee work environment that offers workers the chance to be safer\, free themselves from the daily commute and complete their tasks. And it's more and more seen as indefinite during the COVID-19 pandemic.\n\n \n\nAlong with the safety and flexibility of working from home comes the risk of cybersecurity issues that occur outside of a protected corporate network. Ensuring that there is a secure connection to the company\, and on the home network & machine itself\, is extremely important\, but can be a puzzle for employees and employers alike.\n\n\n\nJoin CMIT Solutions President Scott Krentzman in this informative talk in making sure that your sensitive information accessed via remote home locations remains confidential from cybercriminals looking to gain control over your information and your business network.
X-ALT-DESC;FMTTYPE=text/html:The ability to work from home is a prized and now often compulsory employee work environment that offers workers the chance to be safer\, free themselves from the daily commute and complete their tasks. \; And it'\;s more and more seen as indefinite during the COVID-19 pandemic.
\n \;
\nAlong with the safety and flexibility of working from home comes the risk of cybersecurity issues that occur outside of a protected corporate network. \; \; Ensuring that there is a secure connection to the company\, and on the home network &\; machine itself\, is extremely important\, but can be a puzzle for employees and employers alike.
\n
\nJoin CMIT Solutions President Scott Krentzman in this informative talk in making sure that \;your \;sensitive information accessed via remote home locations remains confidential from cybercriminals looking to gain control over your information and your business network. \; \;
\n \;
\n \;
LOCATION:via Zoom
UID:e.2080.10596
SEQUENCE:3
DTSTAMP:20240328T091751Z
URL:https://nn.nnchamber.com/events/details/best-practices-for-securing-your-home-office-10596
END:VEVENT
END:VCALENDAR