When it comes to non-state cyberweapons, there are some significant differences between them and state-funded devices/software. While the funding and manpower of non-state cyberweapons are certainly reduced, the potential consequences and reach of the weapons are still present. As cybercrime is quickly rising in the hands of often […]
Carefully created and thorough data backup (BCP) and recovery plans (DR) are crucial for anyone who wishes to secure their data in the event a problem arises; this is even more necessary if your company handles a large amount of sensitive data such as credit card information, transactions, […]
Continuously auditing any system or process is as vital as the building and maintenance stages of the initial build, all of which combine to create an effective product. There are eight phases of an audit engagement as described in Angel R. Otero’s publication, “Information Technology Environment and I.T. […]
You must be logged in to post a comment.