• Security
  • 16/10/2020
If all computers are vulnerable, how strong are your security defences?

You should now understand the difference between Privacy, Anonymity and Pseudonymity. which should lead you to a more defined choice of security controls.

You should also have a clearer idea of what you value most, but how are you going to protect it?

Your valuables should be central to what you build your security infrastructure around in order to protect your business from those who you believe potentially pose the biggest threat to your assets.

The red triangles above represent the 'chinks in the armour' of your security controls. As long as humans create the computers we use; the computers we use will have vulnerabilities, bugs will exist and there will be weaknesses in your operating system. This is why all businesses are vulnerable.

Those who pose a threat to your business will try to exploit vulnerabilities in your security defences in an attempt to gain access to your most valuable assets. An example of this could be malware attempting to infect your computer or network through a vulnerability being unpatched.

Click here for a more in-depth analysis of particular security controls best suited to protect your assets from those who may be a threat to your business, depending on what assets you have.

Recent Post

The Cloud Question

Security

Are IT preconceptions holding the business back?

Security

Do we value our data enough to protect it?

Security

Privacy or anonymity? - Which is more important in the digital era?

Security

If all computers are vulnerable, how strong are your security defences?

Security

Related Posts

  • Security
  • Jan

Do we value our data enough to protect it?

I’m sure you know yourself. You know your business. Of course you want to protect everything in it,

Read More
  • Security
  • Jan

Privacy or anonymity? - Which is more important in the digital era?

Technology is evolving quicker than most peoples’ ability to understand it; therefore it is increasi

Read More
  • Security
  • Jan

The Cyber Security Landscape - Best Practices to Protect Your Business Data

What business owners consider to be valuable assets will vary from one business owner to another  bu

Read More
  • Security
  • Jan

The Cyber Security Landscape - To what degree is your business at risk?

It is critical to know who your enemy is. ‘Better the devil you know’ as they say. If you have never

Read More