Two questions must be asked at the beginning of any security consideration: What do you want to protect, and what are the consequences if you fail? The answers to these questions will determine what actions you should take.
The Solarwinds and Hafnium attacks are two prominent examples that show how the security situation worldwide continues to worsen. Hacking is the path of least resistance. The question is, how do you become a victim of cybercrime? Well, by feeling too safe!
Four steps to security
Knowledge and rules make the difference
Analysis: IT security check
Analysing your IT environment serves as a compass for your security considerations. When was the last time your IT systems underwent a security check?