Saturday, July 25, 2015

Ashley Madison Extortion Attack: Critical Lessons For Enterprise Cybersecurity

Organizations already know to protect personal information of customers and employees, intellectual property secrets, passwords, private keys, and the like – information that a hacker seeking financial gain would covet. But an extortionist will be seeking confidential information that simply has the power to embarrass your organization, regardless of any potential financial value.

No comments:

Post a Comment