- {- item.details.type -}
- {- item.details.date -}
- {- item.details.sector -}
Limit search to:
-
{- f.title -}
- {- option.title -}
Your settings:
- {- option.title -}
Get insights into what it takes to trust data-driven and digitalized operations in high-risk industries, and where digital technologies, such as blockchain, can introduce new ways of building trust between stakeholders.
Data and information protection comprise the third and most important pillar of a sound cyber security strategy. It is crucial to consider the ‘CIA triad’ when considering how to protect our data.
But processes are nothing if people don’t follow them correctly.
Remote Desktop Protocol are increasing every year. Hackers use developed methods of indentifying and exploiting vulnerable RDP sessions to launch ransomeware attacks.
You may find inspiration in a three-pillared strategic approach to cyber security.
These include information technology, telecommunication, transport and healthcare – all fuelled by electricity.
{- item.text -}