I am part
of a generation that has lived the evolution of technology year after year.
I've been a part of every breakthrough, from the text messaging device called
"beeper" to the DynaTAC 8000X mobile phone that at that time only the
wealthy class could have one of these. Like many
of my generation, I am passionate about everything related to technology, but I
must admit that the most that captures my interest is related to security and
risk events in technological resources. I spend my free time reading articles,
books and / or reports on the latest incidents or events that have tested the
security measures implemented by companies, through attacks perpetrated by
cybercriminals.
It is
interesting to evaluate each event, to look for the root cause,
the security measures that the cyber-criminal broke, what security measures were
implemented to mitigate the cyber-attack and compare them with the measures that
I would implemented if were my case. I take more focus on the lessons learned
by each event and the peculiarities of each event, since each company has its
own structure. As an inveterate lover of the subject I must confess that there
is not an absolute security, that there is always a risk to which our company
will always be exposed. The difference lies in how prepared your staff and the
company are to face an adverse event. The exposure is always there, The result
of whether it affects us and how much it affects us, is determined with the
measures we implement, the strategies we establish and the continuous
evaluation of their progress.
If You like this post, you can Follow me to share more post like this with you!
If You like this post, you can Follow me to share more post like this with you!
No hay comentarios:
Publicar un comentario