Insurance exists for just about everything nowadays. This week I am reviewing Kelli Young‘s blog post, titled Cyber Case Study: Target Data Breach, considering a case study of a the famous 2013 Target data breach, and how having insurance could’ve alleviated much of the damage done. The post comes from CoverLink‘s blog. In 2013, Target […]
If you’re able to think like a hacker (psst, or employ people who can), you’re able to undoubtedly identify possible attack vectors which malicious hackers may attempt to utilize. to breach into your network. My pick for this weeks article, Why Managers Should Think More Like Hackers, written by Paulo Savaget, of the Harvard Business […]
I discovered this CyberPolicy article, that asks the question: What Type of Organizations Do Hackers Target the Most? Like any other form of shady activity, there is a reason hackers hack. Most every time, especially on a large scale of newsworthy hacking situations, it is to obtain some sort of sensitive data. This is the […]
It’s no secret to IT Security personnel that an organization’s users must understand that they themselves are major attack vectors to those with malicious intent. It is because of this, they need to not only be well versed in knowledgeable of common internet safety, but be up-to-date with the most recent techniques hackers may employ […]