Security Controls that Mitigate the Human Factor in Cyber Risk from factors 66 Watch Video
Preview(s):
Gallery
Play Video: (Note: The default playback of the video is HD VERSION. If your browser is buffering the video slowly, please play the REGULAR MP4 VERSION or Open The Video below for better experience. Thank you!)
⏲ Duration: 35 min 67 sec ✓ Published: 07-Nov-2018
Description: Attackers will exploit vulnerabilities and user privileges to gain a foothold in even the best- armored organisation. However, more often than not, they find a weak link that was caused by an organization’s human hands. In fact, a startling 66% of cyber security breaches reportedly originate from insiders, either via employee negligence or conscious, malicious actions. Once on the inside, hackers use access and privileges to move laterally through the network, taking control of more assets, an
Play Video: (Note: The default playback of the video is HD VERSION. If your browser is buffering the video slowly, please play the REGULAR MP4 VERSION or Open The Video below for better experience. Thank you!)