Quantcast
Channel: Spiceworks Community
Browsing all 42 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How to Avoid Becoming the Blamed Victim

New story-style blog by @Javvad. The questions to ask yourself: This topic first appeared in the Spiceworks Community

View Article


How to Avoid Becoming the Blamed Victim

It boggles my mind how few people consider this.

View Article


How to Avoid Becoming the Blamed Victim

Interesting read.. Not sure I agree with the analogy.. a little too easy, and a poor example in my opinion.After all.. let's face it.  It's not a matter of 'if'.. but of 'when'.. no matter how prepared...

View Article

How to Avoid Becoming the Blamed Victim

Excellent questions.  Note that none of these are IT only answers.  They all require executive buy in to properly answer.

View Article

How to Avoid Becoming the Blamed Victim

Great info! Definitely important to make sure you have a plan in place so that if a breach ever happens, you're not pulling a chicken-with-its-head-cut-off move.

View Article


How to Avoid Becoming the Blamed Victim

These are great questions! Before a breach I would also ask: "Are the employees trained to keep this information safe?" 

View Article

How to Avoid Becoming the Blamed Victim

Mike400 wrote:Excellent questions.  Note that none of these are IT only answers.  They all require executive buy in to properly answer.^^ This. It's critical to have executive buy in!Thanks for the...

View Article

How to Avoid Becoming the Blamed Victim

Justin - 7 wrote:Mike400 wrote:Excellent questions.  Note that none of these are IT only answers.  They all require executive buy in to properly answer.^^ This. It's critical to have executive buy...

View Article


How to Avoid Becoming the Blamed Victim

Great article Javvad!

View Article


How to Avoid Becoming the Blamed Victim

You missing these three steps:Before:  Ensure you keep current skills current and learn new things, stay motivated.  Ensure you have an up to date CV for when a good opportunity arises.During: Use...

View Article

How to Avoid Becoming the Blamed Victim

with the mad state of internet threats this is a lingering problem in the back of my mind....any time now....any time....

View Article

How to Avoid Becoming the Blamed Victim

In all seriousness, there are 6 steps for an incident such as a breach, these cover the before, during and after.Based on the SANS PICERL model.Preparation: You should be documenting your environment,...

View Article

How to Avoid Becoming the Blamed Victim

brianwheltonlike your thread better than the starting post - more real worldgood read. exec buy in is everything though. security is not an IT only problem - its a company problem 

View Article


How to Avoid Becoming the Blamed Victim

brianwhelton wrote:In all seriousness, there are 6 steps for an incident such as a breach, these cover the before, during and after.Based on the SANS PICERL model.Preparation: You should be documenting...

View Article

How to Avoid Becoming the Blamed Victim

You can have the best, most secure, properly configured equipment on the planet and get breached, because your users are always going to be the weakest link. Just make sure they are educated and...

View Article


How to Avoid Becoming the Blamed Victim

very excellent approach. 

View Article

How to Avoid Becoming the Blamed Victim

Am i the only one who is going to say something about the blatant coffee cup stain on the second picture?Is that on purpose?

View Article


How to Avoid Becoming the Blamed Victim

Ross42. wrote:Am i the only one who is going to say something about the blatant coffee cup stain on the second picture?Is that on purpose?Yes, it refers to the start of the story where he is drinking...

View Article

How to Avoid Becoming the Blamed Victim

Mike400 wrote:Excellent questions.  Note that none of these are IT only answers.  They all require executive buy in to properly answer.Without executive buy in IT will always be blamed

View Article

How to Avoid Becoming the Blamed Victim

Anyone can be breached, no matter how good the infrastructure is. The biggest threat to it however is caused by the End Users (Clients), typically through e-mail attachments. Sure you can have an AV...

View Article
Browsing all 42 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>