IT - Operations

Make these mistakes and invaders might linger in your systems for years

"Although cybersecurity technologies continue evolving to address current threats, many data breaches remain undiscovered for months or even years. For instance, in one of the biggest data breaches discovered in 2018, which affected 500 million customers of the Marriott Hotel Group, hackers went undetected for four years.

How can your organization detect threats faster and reduce the chances of a breach? Unfortunately, there isn't one solution. But we can analyze the root causes of known breaches and learn from them. In this column, we'll examine five common errors that make it easier for attackers to linger in an IT network undiscovered and advice on how to mitigate the risks..."

How To Choose A Cyber Insurance Policy
Information Age, February 10th, 2020
Cyber insurance is becoming increasingly vital for protection, so what's to be considered when choosing an insurance policy?

"Cyber insurance is a relatively new area that's hard to navigate. A standard policy is hard to come by and it's difficult to know what you're getting for your money. This article will seek the expertise of leading legal minds and cyber experts to discuss these problems.

Be prepared to show sufficient security measures

Cyber insurance providers will not offer cover for attacks to businesses that seem to be at fault for those attacks..."

More Than Half of Respondents Report They Mistakenly Spend Time Fixing Devices Under Warranty

"Ivanti, the company that unifies IT to better manage and secure the digital workplace, released survey results highlighting the challenges faced by IT organizations when it comes to aligning their IT Service Management (ITSM) and IT Asset Management (ITAM) processes. According to data collected by Ivanti, 43% of IT professionals surveyed reported using spreadsheets as one of their resources to track IT assets. Further, 56% currently do not manage the entire asset lifecycle, risking redundant assets, potentially creating a risk, and causing unnecessary and costly purchases..."

See all Archived IT - Operations articles See all articles from this issue