lunes, 7 de agosto de 2017

Information Technology Risk Management


The need to constantly evaluate the security measures implemented in our mechanized operational processes arises from constant change in technology and the incursion of new techniques for cyber crimes that put our operation at risk. It is important to have the right equipment to carry out, these and other evaluations, which provide us with the necessary information to protect us from any adverse events.

That is why, with each update and / or integration of a new program, it is recommended that the company conduct a risk assessment. The scope of the risk analysis will depend on the needs of the company, this can be a strategic, operational, financial and / or Compliance. In the attached image, I share a general model of risk assessment:



No hay comentarios:

Publicar un comentario

The Implementation of the backup strategy

The backup strategy can be your biggest defense in case of a cyber-attack. Establishing a good strategy to perform the data protection pro...