jueves, 10 de agosto de 2017

The Cybersecurity Search

I am part of a generation that has lived the evolution of technology year after year. I've been a part of every breakthrough, from the text messaging device called "beeper" to the DynaTAC 8000X mobile phone that at that time only the wealthy class could have one of these. Like many of my generation, I am passionate about everything related to technology, but I must admit that the most that captures my interest is related to security and risk events in technological resources. I spend my free time reading articles, books and / or reports on the latest incidents or events that have tested the security measures implemented by companies, through attacks perpetrated by cybercriminals.


It is interesting to evaluate each event, to look for the root cause, the security measures that the cyber-criminal broke, what security measures were implemented to mitigate the cyber-attack and compare them with the measures that I would implemented if were my case. I take more focus on the lessons learned by each event and the peculiarities of each event, since each company has its own structure. As an inveterate lover of the subject I must confess that there is not an absolute security, that there is always a risk to which our company will always be exposed. The difference lies in how prepared your staff and the company are to face an adverse event. The exposure is always there, The result of whether it affects us and how much it affects us, is determined with the measures we implement, the strategies we establish and the continuous evaluation of their progress.










                       If You like this post, you can Follow me to share more post like this with you!

No hay comentarios:

Publicar un comentario

The Implementation of the backup strategy

The backup strategy can be your biggest defense in case of a cyber-attack. Establishing a good strategy to perform the data protection pro...