How to Destroy Perfectly Good Cybersecurity Policies

cybersecurity policies

One of my favorite phrases is “snatching defeat from the jaws of victory.” The slight modification of the old idiom to reflect an action that transforms guaranteed success into abject failure.

It is also the perfect way to understand how it’s possible for even the most effective, well-written, well-intentioned, and strategically developed cybersecurity policies to become irrelevant.

I’ve seen so many ways a company can completely negate their own cybersecurity. Usually, it involves some level of management errors, the most common being that “these policies don’t apply to me.”

However, there are many ways, some much less obvious, for management to undermine their company’s own cybersecurity policies.

And, by extension, making their company, their employees, their customers, and themselves less secure. (more…)

The One Thing You Need to Know About Your Cyber Incident Response

cyber incident response cybersecurity law

We’ve been hacked.

Those words send a chill the first time you hear them, trigger flashbacks any time after that.

What now?

You know there are things that you need to do. Many of those things are some combination of painful, expensive, and embarrassing.

And they need to be done quickly and correctly. You need the right kind of person to get it done. You need the right Cyber Incident Response Manager…


Pin It on Pinterest