Sun Tzu's 13 lessons to combat hackers

Staff Writer
Page 2 of 14  |  Single page

Defend your virtual shop front

Sun Tzu's 13 lessons to combat hackers

"The art of war is of vital importance to the State.  It is a matter of life and death, a road either to safety or to ruin. Hence it is a subject of inquiry which can on no account be neglected."

If your digital presence, your business shop front to the online world, is the lifeblood of your company then it must be defended. For example, online banks have no physical shop window and if customers can't reach their online presence during a distributed denial of service attack, that company can't process transactions and their viability is threatened.

Ask yourself: How long could you survive?

As part of your company's business continuity plan, a cyber incident response should be written to counter cyber attacks against your critical IT systems and assist management to identify, mitigate and recover from such assaults.

It's the business that owns such risks, including those related to IT. It should set the mandate for the risk-management program, provide resources to support a plan to protect critical systems and monitor how well risks managed. For ICT governance to be effective, senior management should review and approve the plan, agree priorities and commit resources.

The IT Governance Institute recommends that an executive committee with representation of all stakeholders review and approve the plan for the board of directors.

Is your virtual shop front secure or are you at risk of losing custom?
   Is your virtual shop front secure or are you at risk of losing custom?
Previous PageNext Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Phishing attack nets enormous npm supply chain compromise

Phishing attack nets enormous npm supply chain compromise

Service NSW centralises security, networking in mammoth CloudOps overhaul

Service NSW centralises security, networking in mammoth CloudOps overhaul

VicRoads to phase out passwords in favour of passkeys

VicRoads to phase out passwords in favour of passkeys

Apple adds "mercenary spyware" protection to new A19 chip

Apple adds "mercenary spyware" protection to new A19 chip

Log In

  |  Forgot your password?