Hackers: they’re all over the place now-a-days. What can your company do to protect themselves? Would you be willing to sacrifice common features and functionality in business to protect your business for cyber-security? Question 1: What is the business’s risk appetite? Confidential or private data, do you need to protect it? Question 2: What are the real threats this attack surface presents? Are there significant threats to your company? Question 3: What are the potential consequences of an attack via this entry point? If the attacker can use your company network to damage others, it is crucial you look over this question. Finally, question 4: How likely is an attack? Your company shouldn’t be worried if an attack is not likely.
Key Takeaways:
- Measuring how likely an attack is should be part of any security evaluation.
- Measure what is to be gained or lost by an attack.
- Look at all your entry points. You probably have the big ones locked down. It only takes one weak link that was missed.
“Even something as seemingly-innocuous as a printer can leave an organisation wide open to significant threats. Compromising the printer network lets attackers control and monitor the corporate network.”
Leave a Reply