Firms must remember that engaging people in the battle against intruders is key to good security
There are many different ways to find vulnerabilities in an IT system, and security managers must try to find and block them all, whereas the intruder only needs to find one. Intruders can expl...
To continue reading this article...
Join Computing
- Unlimited access to real-time news, analysis and opinion from the technology industry
- Receive important and breaking news in our daily newsletter
- Be the first to hear about our events and awards programmes
- Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
- Access to the Computing Delta hub providing market intelligence and research
- Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders