What Should A CIO Do After You’ve Been Hacked?
CIOs who have been hacked need to understand what steps they need to take after the hack has occurred in order to better secure their networks
The Premier Blog For Learning How To Become A Successful CIO
CIOs who have been hacked need to understand what steps they need to take after the hack has occurred in order to better secure their networks
CIOs can use deception technology to plant decoys in their network that will entrap hackers and give security teams time to deal with an intrusion
CIOs who want to get their employees to do a better job of selecting strong passwords might want to think about providing nudges to get them to take action
CIOs need to find ways to get their employees motivated to create longer and more secure passwords in order to protect their corporate networks
If you take a look at the long list of things that a modern CIO is responsible for, securing the company’s network is right there at the top. What this actually means is many different things. The importance of information technology requires that firewalls have to be deployed, encryption schemes have to be put in … Read more
If a CIO picks up the paper, it seems like hackers are everywhere and getting into every IT department. Dare I say these modern day cyber pirates seem almost unstoppable? If it turns out that there is no way to keep hackers from breaking into your company’s IT systems, then should a CIO really spend … Read more
The world is a very dangerous place. Your IT department has lots and lots of data on its computers that bad people would like to get their hands on. Thank goodness your company has taken care to secure every way that there is for outsiders to get into your company’s network. Oh, wait a minute. … Read more
When you think about someone trying to make off with your company’s private data, what comes to mind? Some wily Russian hacker who sneaks into your company’s network through the backdoor? Perhaps you need to update your thinking. A recent report from Cisco revealed that the real threat is coming from insiders. What’s a CIO … Read more
I had an opportunity to attend a very large IT health care show up in Chicago awhile back and I was surprised to discover that Kevin Mitnick, the somewhat infamous computer hacker, was scheduled to give a speech. Now even though I don’t move in computer security circles that much, I know about Kevin Mitnick. … Read more