If the computers in a business are not safe and secure - the business is at risk. The 10 areas detailed in this article provide a basis for assessing how much risk a business is exposed to.
IT systems form an integral component of all business processes, and are being attacked in a number of ways with increasing frequency. This requires shorter reaction times to deal with the attack before it impacts on the business.
Often an organisation is unaware that an ‘attack' has taken place.
Recreational video use at work is crashing company networks and starving business critical applications of the bandwidth they need.
Millions of applications are installed on company networks each day without the permission of the company. These pieces of software are known as 'Greynets'. They are multiplying constantly and, with many remaining unknown and difficult to locate, they are damaging network performance, distracting staff, and creating a hole in network defences.
Employees and their gadgets are now the biggest threat to IT security.
Passwords are one of the many lines of defense against intruders. Your castle guards -- the login programs and the like -- believe that you are who you say you are because you have your password. Therefore, it is important to strengthen the passwords and safeguard them.
Be aware that scammers are getting more sophisticated in tricking people to give them account names and passwords.
Disrupt Less, Innovate More
How To Use Presentations As A Tool To Change Internal Culture
Copyright © 2019
International Institute of Directors and Managers
ABN 26 112 140 299.
All rights reserved.