p1agt48i6b1k1rs181ol41601o5lu.jpg
Cybercrime is an insidious business; it happens in plain sight, avoids detection and causes damage quickly. There are even cybercrime-as-a-service offerings available to criminals who lack the technical know-how to reap the big jackpots capable of totaling tens of millions of dollars, according to Logicalis, an international IT solutions and managed services provider (www.us.logicalis.com). So, how do you prepare your organization to overcome an eventual attack? The firm stresses that any solution begins by answering these important questions. [This slideshow first appeared on Information Management]
p1agt45lqg1o131a9t1pqrnlb17l98.jpg
If you knew that your company was going to be breached tomorrow, what would you do differently today?
p1agt45lqgec58b958d1fr413t99.jpg
Has your company ever been breached? How do you know?
p1agt45lqg1jhjugddaoa5b1dava.jpg
What assets am I protecting, what am I protecting them from (i.e., theft, destruction, compromise), and who am I protecting them from (i.e. cybercriminals or even insiders)?
p1agt45lqg1i021qj214hp18n97klb.jpg
What damage will we sustain if we are breached (i.e., financial loss, reputation, regulatory fines, loss of competitive advantage)?
p1agt45lqh140kd4d1dbl7aaqmdc.jpg
Have you moved beyond an “inside vs. outside” perimeter-based approach to information security?
p1agt45lqh1but3sb1ao91k921354d.jpg
Does your IT security implementation match your business-centric security policies? Does it rely on written policies, technical controls or both?
p1agt45lqh86q1bciojt1pd71t5ke.jpg
What is your security strategy for IoT (also known as “the Internet of threat”)?
p1agt45lqh1vef154k8ij2qc4nf.jpg
What is your security strategy for “anywhere, anytime, any device” mobility?
p1agt45lqiaq8ga91q2i1k0r59fg.jpg
Do you have an incident response plan in place?
p1agt45lqjrscpk21iro6r51ghth.jpg
What is your remediation process? Can you recover lost data and prevent a similar attack from happening again?