When tallying damages associated with a ransomware attack, the initial focus centers on calculating costs relating to the six steps detailed in the NIST Computer Security Incident Handling Guide that cover the initial detection and move on to the postmortem stage as quickly as possible. Those costs are perhaps the easiest to calculate, given that […]
Colleges and universities service a diverse group of information technology customers. Those customers generally fall into three distinct groups composed of faculty, staff, and students. Because of the nature of the services these institutions provide, they are held accountable in meeting requirements associated with a variety of laws, regulations, and standards. As a consequence, security […]
A REVEALING REPORT FOR IT PROFESSIONALS BY IT PROFESSIONALS