everyone: older news
by Brent Kirkpatrick
(Date Published: 4/3/2019.)
Perhaps you have heard of these checklist security methods, such as the best practices for HIPAA or the PCI-DSS checklist. One problem with these lists is they assume that all businesses have the same budgets and the same access to technology. Another problem is that following the checklist does not restore cybersecurity after a hack takes place.
If your current cybersecurity plan is a checklist, please consider new strategies. Some people advocate for the NIST method of detection and reaction to security challenges. Please make sure that you have a strategy beyond just a checklist.
Save your company's reputation and security by preparing a strategy and knowing how you will address intrusions. Being prepared ahead of time will make all the difference.
Trojan Hunter (TM). Digital forensics for Trojans at an accessible, fixed price. For any operating system.