Skip to Main Content
The True Cost of Information Security Breaches: A Business Approach
book

The True Cost of Information Security Breaches: A Business Approach

by Prof.John Walker, Michael Krausz
July 2013
Beginner to intermediate content levelBeginner to intermediate
73 pages
1h 20m
English
IT Governance Publishing
Content preview from The True Cost of Information Security Breaches: A Business Approach
4: Case Studies
50
Although the data is still in circulation, the
company’s actions meant it was rendered useless for
the thieves. The only negative effect remaining is
that spam filters have to include all those new mails
generated by spam providers that think this data is
still worth anything.
While it is always hard to apprehend the actual data
thieves, a company needs to have the most relevant
and important elements of an ISMS in place to avoid
situations like this. It was, indeed, rather easy to
handle from a business perspective, but still there is
an aftertaste of this data having been stolen in the
first place. Thankfully, the press did not notice.
(3) Stolen laptops (generic)
We will keep this one brief and generic as nowadays ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Once More Unto the Breach: Managing information security in an uncertain world

Once More Unto the Breach: Managing information security in an uncertain world

Andrea C Simmons

Publisher Resources

ISBN: 9781849284967