Preparing For the Breach: A Look Into Essential Cyber IG Practices
May 31, 2016
“The key to a good IG policy,” explains Farid Vij, lead information governance specialist at ZL Technologies, “Is having a complete understanding of your data at all times so that you can be in a proactive position during a data breach, which is the biggest challenge for enterprises today. There’s simply too much data.”
“The key challenge with these breaches is often figuring out what data has actually been compromised and ironically, most organization don’t know where to start,” says Vij. “Take Sony, for example. The majority of the risk and cost associated with the cyberattack was not the data that was directly hacked, but all the data that the hackers got access to as a result of securing passwords and confidential information.”
To read the full article, please visit Law.com.
To download a pdf version of this article, please click here.