They bridged the moat; now what?

Symantec (makers of Norton AV software), who should know, says that antivirus software catches only 45% of cyberattacks.  So the battle then becomes one of mitigation: how do you limit the damage after the bad guys get in?  Why should you care?  Ask the former CEO of Target.

“Thwarting Hackers After They Invade,” Wall Street Journal, May 5, 2014 B1 http://on.wsj.com/1lTAacb

What steps do/should you take to monitor and prevent theft of information inside your perimeter defenses?

Advertisements

Leave a comment

Filed under Board, Business Case, Controls, Duty of Care, Governance, Information, Interconnections, Internal controls, IT, Management, Protect, Protect assets, Protect information assets, Risk, Security, Third parties, Value

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s