Third Defensive Layer: Form the Protective Circle
You have done your best to plan, and your servers and workstations are patched to the best of your ability. If an attacker were to make it through to your platform, despite your best efforts, you need to ensure that your most valuable assets are protected. When a herd of elephants is threatened, the adults form a protective circle around the young calves. They put their most valuable assets inside the circle and will defend these assets with their lives.
Traveling back from the African savannah into realm of IT security, your data is your organization's most valuable asset and you have a multitude of defenses at your disposal. The two most prominent methods have already been written about in ...
Get Seven Deadliest Microsoft Attacks now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.