The first rule of survival:
Don’ t Cross the Street Blindfolded

Companies spend money on the wrong things.

Commonly Stolen:
Personal Information
Credit Information
Medical Records
Intellectual Property
Customer/Partner Data
Network Credentials
Email Addresses/Passwords

The second rule of survival:
Diamonds vs. Toothbrush

Risk Mitigation: Pre-Planning
What’ s Most Important?
Banking Credentials
Cloud Storage
Vendor Access
Remote Management
Employee PII
Credit Information
Medical Records
Social Media Presence
Intellectual Property
Customer Data
Supply Chain Data
Network Credentials
Email Addresses
Legal Data
Financial Records
Payroll and Accounting Data

The third rule of survival:
Don’ t Go to Costco the Day of the Storm

Risk Mitigation: Response

Risk Mitigation: Response

Risk Mitigation: Compliance

Risk Mitigation: Insurance

Risk Mitigation: Exercise

The fifth rule of survival:
It’ s best to solve the problem with the simplest method.

Data Breach: When it’ s not a drill

There are two kinds of companies in America: those who’ ve been breached and those who don’ t know they’ ve been breached.
FBI Director James Comey

Categories: News