CHAPTER 4Developing a Continuity of Operations Plan
Melinda just got home from an awards dinner and checked her e-mail for the first time that night. As CEO, Melinda always faced a full inbox no matter how many times she checked her messages. Mixed in with regular e-mails was a very odd one from an address unfamiliar to Melinda.
“We have hacked your computer systems. Prepare to suffer, fools!” was the subject line of the strange message.
Although she was afraid to open the e-mail, she did.
In the body of the e-mail, the sender wrote, “Your network is hacked! We have six terabytes of data.” Embedded in the e-mail and attached to it was proof that whoever sent the e-mail had internal code development files and so much more.
Melinda immediately called her general counsel John, who was napping ...
Get Cybersecurity Risk Management now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.