You should now understand the difference between Privacy, Anonymity and Pseudonymity. which should lead you to a more defined choice of security controls.
You should also have a clearer idea of what you value most, but how are you going to protect it?
Your valuables should be central to what you build your security infrastructure around in order to protect your business from those who you believe potentially pose the biggest threat to your assets.
The red triangles above represent the 'chinks in the armour' of your security controls. As long as humans create the computers we use; the computers we use will have vulnerabilities, bugs will exist and there will be weaknesses in your operating system. This is why all businesses are vulnerable.
Those who pose a threat to your business will try to exploit vulnerabilities in your security defences in an attempt to gain access to your most valuable assets. An example of this could be malware attempting to infect your computer or network through a vulnerability being unpatched.
Click here for a more in-depth analysis of particular security controls best suited to protect your assets from those who may be a threat to your business, depending on what assets you have.
Security
I’m sure you know yourself. You know your business. Of course you want to protect everything in it,
Technology is evolving quicker than most peoples’ ability to understand it; therefore it is increasi
What business owners consider to be valuable assets will vary from one business owner to another bu
It is critical to know who your enemy is. ‘Better the devil you know’ as they say. If you have never