What business owners consider to be valuable assets will vary from one business owner to another but when all is said and done - it's all data.
You may consider the privacy of your assets to be an asset in itself; as this may relate to your identity and anonymity. Maybe you don’t want some things associated with your identity. This could be anything from your browser history, what you download or something you share on social media.
What you consider to be assets are individual to you and your business.
However, many if not all of us share most of the following common denominators:
Your valuable assets may consist of:
Your privacy. Your anonymity. Your files. It's all data at the end of the day.
We consider it best practice to apply security through various security controls to protect what you value. This means you really need to understand completely to what degree your security and IT infrastructure services are resisitant to threats from those who pose them.
We select security controls based on the types of threats and adversaries we face.
There a many security controls to choose from such as:
Threats are the unsavoury dangers to your data that can materialise in the cyber landscape such as:
Threats must be manifested and enabled by an appropriate agent for them to be realised. The people who enable threats to your assets could be:
Our engineers define risk by the probability of a possible threat exploiting vulnerabilities in both your systems and security controls plus the potential consequences of a threat materialising. There is risk to your business data so as long as a cyber criminal considers business data to be valuable.
For all of us in the digital era - our privacy, identity and anonymity are all under the same umbrella of what it is that whets a hackers' appetite.
Those who pose the threats are your enemy. You protect yourself by thinking of them as the enemy.
Understanding the threat landscape you face is knowing your enemy.
Click to calculate to what degree your business is at risk based off assets you consider valuable.
I’m sure you know yourself. You know your business. Of course you want to protect everything in it,
Technology is evolving quicker than most peoples’ ability to understand it; therefore it is increasi
You should now understand the difference between Privacy, Anonymity and Pseudonymity. which should l
It is critical to know who your enemy is. ‘Better the devil you know’ as they say. If you have never