This book gives you a plan to build a secure business that can detect and respond to a cyber attack, delivered in a direct and succinct fashion. This book covers what IT must do, what the organizations must do at the management level, and how to verify it will work when needed.
A data breach is bound to happen to every company. It is just a matter of when. Here are two new data breaches announced this week and some food for though.
Hardware and software vendors want to collect your device feedback and usage statistics. This is a major privacy concern. it is not anonymous by any means.
The statistics are staggering when in comes to cyber attacks.
Every cyber security event shoudl be treated like an attack. Not following the trail of evidence will only increase the severity of an attack.
Cyber Security and Data Backups are not unrelated. In fact, they are closely related.
Insurance will not necessarily cover you in the event of a cyber breach. You need to understand what sets to perform to be covered.
There is a rapid adoption taking place of multi-factor authentication. Are you looking at this?
Who is ultimately financially responsible when a brach or denial-of-service occurs?
IT Security and analyst book recommendations "Countdown to Zero Day", "Everybody Lies", and "Man, Interrupted".
Even though Social Hacking might seem like a new dangerous method of breaking into a network, it’s actually one of the oldest methods of manipulation.
There are an endless number of devices that are connected to the Internet. But, are they secure or do they blow a gaping hole into your network?