They bridged the moat; now what?

Symantec (makers of Norton AV software), who should know, says that antivirus software catches only 45% of cyberattacks.  So the battle then becomes one of mitigation: how do you limit the damage after the bad guys get in?  Why should you care?  Ask the former CEO of Target.

“Thwarting Hackers After They Invade,” Wall Street Journal, May 5, 2014 B1

What steps do/should you take to monitor and prevent theft of information inside your perimeter defenses?

Leave a comment

Filed under Board, Business Case, Controls, Duty of Care, Governance, Information, Interconnections, Internal controls, IT, Management, Protect, Protect assets, Protect information assets, Risk, Security, Third parties, Value

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s