Sun Tzu's 13 lessons to combat hackers

Staff Writer
Page 2 of 14  |  Single page

Defend your virtual shop front

Sun Tzu's 13 lessons to combat hackers

"The art of war is of vital importance to the State.  It is a matter of life and death, a road either to safety or to ruin. Hence it is a subject of inquiry which can on no account be neglected."

If your digital presence, your business shop front to the online world, is the lifeblood of your company then it must be defended. For example, online banks have no physical shop window and if customers can't reach their online presence during a distributed denial of service attack, that company can't process transactions and their viability is threatened.

Ask yourself: How long could you survive?

As part of your company's business continuity plan, a cyber incident response should be written to counter cyber attacks against your critical IT systems and assist management to identify, mitigate and recover from such assaults.

It's the business that owns such risks, including those related to IT. It should set the mandate for the risk-management program, provide resources to support a plan to protect critical systems and monitor how well risks managed. For ICT governance to be effective, senior management should review and approve the plan, agree priorities and commit resources.

The IT Governance Institute recommends that an executive committee with representation of all stakeholders review and approve the plan for the board of directors.

Is your virtual shop front secure or are you at risk of losing custom?
   Is your virtual shop front secure or are you at risk of losing custom?
Previous PageNext Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

India's alarm over Chinese spying rocks CCTV makers

India's alarm over Chinese spying rocks CCTV makers

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

Cyber companies hope to untangle weird hacker codenames

Cyber companies hope to untangle weird hacker codenames

Log In

  |  Forgot your password?