Libros importados con hasta 50% OFF + Envío Gratis a todo USA  Ver más

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Keeping The Barbarians Out: How CIOs Can Secure Their Department and Company: Tips And Techniques For CIOs To Use In Order To Secure Both Their IT (in English)
Type
Physical Book
Language
Inglés
Pages
78
Format
Paperback
Dimensions
22.9 x 15.2 x 0.4 cm
Weight
0.12 kg.
ISBN13
9781540559029

Keeping The Barbarians Out: How CIOs Can Secure Their Department and Company: Tips And Techniques For CIOs To Use In Order To Secure Both Their IT (in English)

Jim Anderson (Author) · Createspace Independent Publishing Platform · Paperback

Keeping The Barbarians Out: How CIOs Can Secure Their Department and Company: Tips And Techniques For CIOs To Use In Order To Secure Both Their IT (in English) - Anderson, Jim

Physical Book

$ 10.36

$ 12.95

You save: $ 2.59

20% discount
  • Condition: New
It will be shipped from our warehouse between Monday, July 01 and Tuesday, July 02.
You will receive it anywhere in United States between 1 and 3 business days after shipment.

Synopsis "Keeping The Barbarians Out: How CIOs Can Secure Their Department and Company: Tips And Techniques For CIOs To Use In Order To Secure Both Their IT (in English)"

There are a lot of bad guys out there. For some odd reason, a lot of them seem to want to break into your company's networks and applications. As the CIO, it's your job to make sure that this does not happen. Got any thoughts on how to go about doing that? What You'll Find Inside: CIO'S NEED TO LEARN HOW TO DEFEND AGAINST THE INSIDER THREAT WHY BYOD SPELLS DOOM FOR CIOS DO WE REALLY NEED TO ENCRYPT OUR CUSTOMER DATA? 3 WAYS TO GET YOUR COMPANY TO TAKE DIGITAL SECURITY SERIOUSLY As much as we like to spend our time looking outwards in order to detect the next threat that our company may be facing, perhaps we're looking in the wrong direction. Just as big of a deal may be the insider threat that lurks within the company. No matter where it comes from, cybercrime is your problem to deal with. CIOs have to deal with trends as they come and go. Right now the Bring Your Own Device To Work (BYOD) phase is in full swing and if you aren't careful could cause a lot of problems for the IT department. At the same time, it's the code that your teams create that will secure your applications. Do you know if they are writing secure code or are they leaving doors wide open? In order to measure where the threats are coming from and how big of deal they are, CIOs need to become comfortable with measuring the level of risk that they are dealing with. A big part of measuring risk is getting information about threats from other CIOs. This can be difficult to do because CIOs really don't like to share information like this. Since we can't always be certain that we can keep the bad guys out, we need to make sure that we've taken the needed steps to secure our networks. Should they happen to get inside of the company, we need to take extra steps to make sure that they can't get what they came for. This brings up the interesting question of whether or not we should go to the effort and expense of encrypting our customer data. No matter what our final decision on encrypting the company's digital assets is, we still have a responsibly as CIO to make sure that the company understands the threats that it is facing and that it starts to take digital security seriously.

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews