Lost in Translation: Speaking the Same Cybersecurity Language in Your Office by Pauline Farris


According to most of those “in the know,” the most common causes of data breaches are employee activity on company systems (either on work computers or BYOD), backdoors through downloads, and lack of security on the part of third-party vendors. And stats from the first half of 2018 show that there was a total of 658 cyber attacks reported by large enterprises. This does not include those smaller breaches that are never publicly reported, of which there are huge numbers. Smaller organizations may notify their customers/clients but not the “whole world.” Clearly, there is work to be done. And as hackers become more sophisticated, the measures that must be taken to monitor, detect, and take action when threats occur must become more sophisticated too. But the IT department can’t do it all. If you are a member of an IT department, or a security consultant, you know this. Getting everyone....

February 5, 2019
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Oldest Most Voted
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.