How to Avoid Becoming the Blamed Victim
New story-style blog by @Javvad. The questions to ask yourself: This topic first appeared in the Spiceworks Community
View ArticleHow to Avoid Becoming the Blamed Victim
It boggles my mind how few people consider this.
View ArticleHow to Avoid Becoming the Blamed Victim
Interesting read.. Not sure I agree with the analogy.. a little too easy, and a poor example in my opinion.After all.. let's face it. It's not a matter of 'if'.. but of 'when'.. no matter how prepared...
View ArticleHow to Avoid Becoming the Blamed Victim
Excellent questions. Note that none of these are IT only answers. They all require executive buy in to properly answer.
View ArticleHow to Avoid Becoming the Blamed Victim
Great info! Definitely important to make sure you have a plan in place so that if a breach ever happens, you're not pulling a chicken-with-its-head-cut-off move.
View ArticleHow to Avoid Becoming the Blamed Victim
These are great questions! Before a breach I would also ask: "Are the employees trained to keep this information safe?"
View ArticleHow to Avoid Becoming the Blamed Victim
Mike400 wrote:Excellent questions. Note that none of these are IT only answers. They all require executive buy in to properly answer.^^ This. It's critical to have executive buy in!Thanks for the...
View ArticleHow to Avoid Becoming the Blamed Victim
Justin - 7 wrote:Mike400 wrote:Excellent questions. Note that none of these are IT only answers. They all require executive buy in to properly answer.^^ This. It's critical to have executive buy...
View ArticleHow to Avoid Becoming the Blamed Victim
You missing these three steps:Before: Ensure you keep current skills current and learn new things, stay motivated. Ensure you have an up to date CV for when a good opportunity arises.During: Use...
View ArticleHow to Avoid Becoming the Blamed Victim
with the mad state of internet threats this is a lingering problem in the back of my mind....any time now....any time....
View ArticleHow to Avoid Becoming the Blamed Victim
In all seriousness, there are 6 steps for an incident such as a breach, these cover the before, during and after.Based on the SANS PICERL model.Preparation: You should be documenting your environment,...
View ArticleHow to Avoid Becoming the Blamed Victim
brianwheltonlike your thread better than the starting post - more real worldgood read. exec buy in is everything though. security is not an IT only problem - its a company problem
View ArticleHow to Avoid Becoming the Blamed Victim
brianwhelton wrote:In all seriousness, there are 6 steps for an incident such as a breach, these cover the before, during and after.Based on the SANS PICERL model.Preparation: You should be documenting...
View ArticleHow to Avoid Becoming the Blamed Victim
You can have the best, most secure, properly configured equipment on the planet and get breached, because your users are always going to be the weakest link. Just make sure they are educated and...
View ArticleHow to Avoid Becoming the Blamed Victim
Am i the only one who is going to say something about the blatant coffee cup stain on the second picture?Is that on purpose?
View ArticleHow to Avoid Becoming the Blamed Victim
Ross42. wrote:Am i the only one who is going to say something about the blatant coffee cup stain on the second picture?Is that on purpose?Yes, it refers to the start of the story where he is drinking...
View ArticleHow to Avoid Becoming the Blamed Victim
Mike400 wrote:Excellent questions. Note that none of these are IT only answers. They all require executive buy in to properly answer.Without executive buy in IT will always be blamed
View ArticleHow to Avoid Becoming the Blamed Victim
Anyone can be breached, no matter how good the infrastructure is. The biggest threat to it however is caused by the End Users (Clients), typically through e-mail attachments. Sure you can have an AV...
View Article