Fai clic su di un'immagine per andare a Google Ricerca Libri.
Sto caricando le informazioni... No Safe Harbor: The Inside Truth About Cybercrime―and How To Protect Your Businessdi Mark Sangster
Nessuno Sto caricando le informazioni...
Iscriviti per consentire a LibraryThing di scoprire se ti piacerà questo libro. Attualmente non vi sono conversazioni su questo libro. Nessuna recensione nessuna recensione | aggiungi una recensione
"Stories of massive data breaches litter the 24-hour newsday headlines. Hackers and cybercrime syndicates are hitting a who's who of banks, retailers, law firms, and healthcare organizations: companies with sophisticated security systems designed to stop crime before it starts. They're also hitting companies that thought they were too small to matter. So how do cybercriminals continue to breach the defenses of the big companies--and why do they go after the small ones? And, most importantly, how can companies of all sizes protect themselves? Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster shows readers that cybersecurity is not an IT problem to solve--it is a business risk to manage. Organizations need to shift the security discussion away from technology gates alone toward a focus on leadership, team behaviors, and mutual support. Sangster punctuates his eye-opening narratives with sets of questions businesspeople at all levels need to ask themselves, facts they need to know, and principles they need to follow to keep their companies secure."-- Non sono state trovate descrizioni di biblioteche |
Discussioni correntiNessuno
Google Books — Sto caricando le informazioni... GeneriSistema Decimale Melvil (DDC)658.478Technology Management and auxiliary services Management Executive Business intelligence and security Computer securityClassificazione LCVotoMedia: Nessun voto.Sei tu?Diventa un autore di LibraryThing. |