The Risk Management Process – During the normal course of business, department heads identify operational risks; develop and document policies and procedures to mitigate these risks; and train their staff on the procedures.
The below list represents individual blog posts that fall under the category of Risk Management. Simply left-click the underlined heading to link to the posting.
Cyber threats are very real and growing. According to the Symantec Internet Security Threat Report (ISTR) 2013, “Last year’s data made it clear that any business, no matter its size, was a potential target for attackers. This was not a fluke. In 2012, 50 percent of all targeted attacks were aimed at businesses with fewer than 2,500 employees. In fact, the largest growth area for targeted attacks in 2012 was businesses with fewer than 250 employees; 31 percent of all attacks targeted them.” It makes sense that cyber threats will migrate to smaller companies that most likely do not have security protocols as extensive as the Fortune 100 companies that spend millions on security.
The below list represents individual blog posts that fall under the sub-category of Cyber Risk. Simply left-click the underlined heading to link to the posting.