Data Protection as an afterthought
Read More: Data Protection as an afterthought8 Terabytes lost….. 14 Terabytes of data recovered from a data migration gone wrong….. that was called a deletion of data not a migration when I worked as a Sys admin or a “Career limiting move”. Considering that the parts of a data migration plan I would outline involve: 1. Assess what data needs to…
Employees vs Home owners
Read More: Employees vs Home ownersOr a look into the psychology I have written about this before and today I saw a question today on linkedin related (Thanks David) …….. But I ran out of words to post as a comment. I want to start by suggesting that often security officers and auditors do not think about the companies assets…
Teach your employees information security
Read More: Teach your employees information securityWhen it comes to securing an organisations digital assets there are several approaches to minimising the risk as there is no solving a moving target. One that is not given the priority is the most obvious and the largest source of risk to a business: people, that is you and me, we are idiots and…
Privilege access Management
Read More: Privilege access ManagementPrivileged Access Management, cyber attacks often still operate primarily on the premise that a logged in user has privileged access to their workstation or Laptop, this aspect has never changed despite platform providers ‘improving’ their security models over time.