It is common for a business to have a person or group of people responsible for cybersecurity. This blog post aims to identify each mistake and outline the framework and security processes that could have prevented them. My concern and frustration rose because each breach was easily preventable. Each business had a limited understanding of the risks associated with inappropriate password controls.Lost passwords comprised the base of the security breaches.Each security breach was not spotted until clients reported suspicious activity.Each company had a Chief Information Security Officer (CISO) or other individuals with ownership of information security.In each case, common themes have prevailed: Over the last two months, four businesses have approached me for support in managing their security breaches.
0 Comments
Leave a Reply. |