![]() |
Cyber Security Landscape
|
*** Mitigation Methods *** Data breaches and security exploits are regularly reported in the media; the victims vary from small startup companies to world-renowned, global organizations. For organizations that suffer a data breach, there are number of possible consequences Data breaches and security exploits ranging from reputational damage and financial damage to legal penalties, depending on the type of data breached and exploited But what can you do to thwart hackers and mitigate data breach risk? The scope of possible mitigation activities is vast, ranging from simple low-level changes that can be made at a personal level to organization-wide business strategy changes |
![]() |
Mitigation Methods | ||||||
Limit & Control Access | Protect Data | Manage Identities & Passwords | Manage Risks, Compliance and Controls | Block Threats & Attacks | Manage Threats & Vulnerabilities | |
Enable Visibility |