Background: Imagine a business where customers are calling every 15-30 minutes during business hours. Staff is constantly on the phone. You walk in one day to silence. You sit down at your desk and can’t log in to your email. Wrong password. Odd, you didn’t change the password. It’s ok, just go to reset it. While you wait for the text message with the instructions you notice that your computer is slow and not always responding to your inputs. Let’s restart it and get coffee. It’s too early for this. You shut the computer down, head to the kitchen for coffee where you find colleagues who are also locked out of their system. A panicked colleague exclaims “we’ve been breached!”
🖥️💻📱🔐Tech Recipe: Build a cybersecurity strategy
🖥️💻📱🔐Tech Recipe: Build a cybersecurity…
🖥️💻📱🔐Tech Recipe: Build a cybersecurity strategy
Background: Imagine a business where customers are calling every 15-30 minutes during business hours. Staff is constantly on the phone. You walk in one day to silence. You sit down at your desk and can’t log in to your email. Wrong password. Odd, you didn’t change the password. It’s ok, just go to reset it. While you wait for the text message with the instructions you notice that your computer is slow and not always responding to your inputs. Let’s restart it and get coffee. It’s too early for this. You shut the computer down, head to the kitchen for coffee where you find colleagues who are also locked out of their system. A panicked colleague exclaims “we’ve been breached!”