Crime and retribution

The presence on the internet of those with malicious intentions has been the subject of Hollywood blockbusters, so it is fair to assume that most business leaders are aware of the threat. But perhaps less well understood is how the business can respond if its IT security is breached…If the police are to catch and prosecute the perpetrators, then IT needs to think about preserving the evidence. Electronic evidence needs to be treated with care. It is important that the integrity of the data is preserved and that it can be demonstrated that no changes have been made. It is essential that there are audit trails logging any access to systems and changes made…

More (

Leave a Comment

Latest Videos

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles

Share to...