10

Computer and Server Security

CAD drawings, customer records, transaction history, and so on are examples of information that an organization holds onto. This information is important to your business and must be safeguarded from adversaries and your competition.

Computers and the software that runs on them are vulnerable – there is no way of getting around that. However, you, as the head of security, must know what to do to protect these systems to the best of your ability.

There is no way of getting to zero risk – it is not attainable. However, IT resources can be configured in different ways to secure them. They can be patched against vulnerabilities. Encryption can be used to further secure remote access or protect the information that ...

Get Executive’s Cybersecurity Program Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.