infographic
cases where this type of attack has occurred,
we have yet to see the real impact.
“In the event that the confidentiality
or privacy of the data is breached, an
organisation must have controls such as
encryption, key management and user
access management in place to ensure that
integrity of the data isn’t tampered with and
can still be trusted.
“Regardless of any concerns around
manipulation, these controls would protect
the data in situ and render it useless the
moment it’s stolen.” u
www.intelligentciso.com
|
Issue 03
23