Friday 29 January 2016

Data Breach & Incident Response: Assess the cybersecurity priorities keeping you up at night

Businesses are generating and storing great volumes of data using numerous platforms: desktops, laptops, servers, cloud servers, archiving appliances, external storage devices, websites and more. Charlie Plattexplains how
iDiscovery Solutions advises clients from both the prevent and protect side as well as incident response. His remarks have been edited for length and style.

MCC: Tremendous amounts of data are produced by businesses today, in a variety of forms from multiple sources. Employees are using personal devices and email, as well as other digital accounts, to communicate and store information. How can businesses assess their vulnerabilities and protect their data, whether at rest or in motion? How can they ensure that they can identify a data breach or network incident and do so quickly?

Platt: It’s important to keep in mind that there is no one-size-fits-all solution to cybersecurity and that no solution can guarantee 100 percent effectiveness. With that in mind, some of the best ways to address the issue are non-technical in nature. For example, education, policies and culture can have a more significant impact on the security of your organization than a large purchase of software or hardware. For the full article click here 



from cyber security caucus http://ift.tt/20cUziI
via IFTTT

No comments:

Post a Comment