The 10 most common IT security mistakes

The 10 most common IT security mistakes
In practice, incident response teams repeatedly encounter the same weaknesses. What are they and how can they be resolved? Encrypted files and a text file containing a ransom note clearly indicate that a company has fallen victim to a cyberattack. But this is only the end of a long chain of attacks. The perpetrators often move around the network unhindered and unnoticed for several weeks or months. IT forensic analyses also show that many attacks could be interrupted well before encryption using...

Save to Folder

Choose a folder to save this article: