What are the top ten threats to your company data? In this episode of Bruce’s Shorts, Bruce Devlin runs through the list in under 3 minutes.
Watch the video to hear more abouts these top ten treats:
10. Insider attacks
9. Lack of contingencies plans
8. Poor configuration
7. Reckless use of hotel networks
6. Reckless use of wireless hotspots
5. Data lost on a personal device
4. Web server compromised
3. Reckless surfing by employees
2. Malicious HTML email
1. Automated exploit of known vulnerabilities
You will be hacked; how do you survive it? How do you protect your data? Find out in the next episode of Bruce’s Shorts.
You might also like...
In the last article in this series, we looked at why integrated monitoring is a necessity in modern broadcast IP workflows. In this article, we dig deeper to understand what is new in IP monitoring and how this integrates with…
The phrase media supply chain is increasingly ubiquitous within the industry, and crops up everywhere from marketing materials to magazine articles. It’s also a fairly new one too, though, so it’s worth unpacking what it means, why it is …
Optimization gained from transitioning to the cloud isn’t just about saving money, it also embraces improving reliability, enhancing agility and responsiveness, and providing better visibility into overall operations.
Video, audio and metadata monitoring in the IP domain requires different parameter checking than is typically available from the mainstream monitoring tools found in IT. The contents of the data payload is less predictable and packet distribution more tightly defined…
Practically all communication, including broadcasting, relies totally on electromagnetic waves that may be radiated far and wide from transmitters or guided along wires, waveguides or optical fibers.