SlideShare a Scribd company logo
The CISO’s Guide to Being Human
How to prevent and cope with accidental data leakage
The CISO’s guide to being human
The issue of data security is becoming ever more
pressing for the public and private sectors:
• Sensitive data that has been lost or leaked by
Britain’s private and public sectors has risen by
1,014% between August 2007 and August 2012
• From 2011/2012, the UK logged 821 data breaches
• 58% of IT professionals polled by Computer Weekly
admit to not using Data Loss Protection products
SOURCE: The Register2012 Verizon Data Breach Investigation Report
While malicious hacking is the number one threat to your
data security, there is one element that still accounts for
making much of it possible – staff making mistakes that
can lead to costly data leakage...
The CISO’s guide to being human
The issue of data security is becoming ever more
pressing for the public and private sectors:
• Sensitive data that has been lost or leaked by
Britain’s private and public sectors has risen by
1,014% between August 2007 and August 2012
• From 2011/2012, the UK logged 821 data breaches
• 58% of IT professionals polled by Computer Weekly
admit to not using Data Loss Protection products
SOURCE: The Register2012 Verizon Data Breach Investigation Report
While malicious hacking is the number one threat to your
data security, there is one element that still accounts for
making much of it possible – staff making mistakes that
can lead to costly data leakage...
97%
97% of breaches
were avoidable
through simple
or intermediate
controls
According to ISACA’s 2012 Governance of Enterprise IT (GEIT) Survey of over 3,700 of its
members, of the security challenges that a company is likely to face in the next 12 months:
According to ISACA’s 2012 Governance of Enterprise IT (GEIT) Survey of over 3,700 of its
members, of the security challenges that a company is likely to face in the next 12 months:
16%
16% will be
mistakes made
by employees
13%
13% will be incidents
relating to employees’
personal devices (BYOD)
According to ISACA’s 2012 Governance of Enterprise IT (GEIT) Survey of over 3,700 of its
members, of the security challenges that a company is likely to face in the next 12 months:
16%
16% will be
mistakes made
by employees
13%
13% will be incidents
relating to employees’
personal devices (BYOD) VIEW INFOGRAPHIC
According to ISACA’s 2012 Governance of Enterprise IT (GEIT) Survey of over 3,700 of its
members, of the security challenges that a company is likely to face in the next 12 months:
16%
16% will be
mistakes made
by employees
13%
13% will be incidents
relating to employees’
personal devices (BYOD)
But are companies doing enough to tackle data compliance issues? According to the same report:
• Nearly 1/4 of respondents said management’s level of involvement in governance is low
• 49% of enterprises will be increasing investments in IT over the next 12 months.
But will they be increasing their data security budgets too?
VIEW INFOGRAPHIC
SOURCE: FlashRouters, Mashable
While DLP solutions are available, there are several
basic lessons that can be instilled into staff to act as
your first line of defense against data leakage:
• More than 60% of people use the same password across
a multitude of accounts; this can make life easy for
hackers
• Use a secure password generator that will create
difficult-to-crack passwords
http://www.pctools.com/guides/password/
Facepalm Passwords
According to SplashData, the worst passwords of 2012 were:
5. ‘qwerty’
4. ‘abc123’
3. ‘12345678’
2. ‘123456’
1. ‘password’
SOURCE: FlashRouters, Mashable
While DLP solutions are available, there are several
basic lessons that can be instilled into staff to act as
your first line of defense against data leakage:
• More than 60% of people use the same password across
a multitude of accounts; this can make life easy for
hackers
• Use a secure password generator that will create
difficult-to-crack passwords
http://www.pctools.com/guides/password/
Facepalm Passwords
According to SplashData, the worst passwords of 2012 were:
5. ‘qwerty’
4. ‘abc123’
3. ‘12345678’
2. ‘123456’
1. ‘password’
Treat your password like
your toothbrush. Don’t
let anybody else use it,
and get a new one every
six months.
Clifford Stoll, data security guru
“Speared by phishing”
SOURCE: Websense, Mashable
SOURCE: Verizon
Spear-phishing is the latest trend in sucker-
punching naive employees; it’s the specific
targeting of particular groups or individuals
via socially-engineered content:
• Combat phishing through employee education.
Facebook holds an annual ‘Hacktober’ where
employees are treated to simulated security
threats for a month. Those who report fake
phishing attempts and other security attacks are
given prizes – while those who fail to do so are
given further training.
“Speared by phishing”
SOURCE: Websense, Mashable
SOURCE: Verizon
Spear-phishing is the latest trend in sucker-
punching naive employees; it’s the specific
targeting of particular groups or individuals
via socially-engineered content:
• Combat phishing through employee education.
Facebook holds an annual ‘Hacktober’ where
employees are treated to simulated security
threats for a month. Those who report fake
phishing attempts and other security attacks are
given prizes – while those who fail to do so are
given further training. 84%
84% of victims
unknowingly possessed
evidence of a breach in
their logs
2012 Verizon Data Breach
Investigation Report
Research has revealed that half of the surveyed companies had lost a device with
important business data on it, causing security implications for over a fifth of
organizations. If correct encryption procedures had been followed, such security
implications would have been eliminated.
[SOURCE: Business Computing World]
Research has revealed that half of the surveyed companies had lost a device with
important business data on it, causing security implications for over a fifth of
organizations. If correct encryption procedures had been followed, such security
implications would have been eliminated.
[SOURCE: Business Computing World]
Encrypt laptops, mobile devices and removable media to ensure that if
tech is lost out in the field (or in a pub), its data remains inaccessible.
[SOURCE: Ernst  Young]
Take extra care...
… and consider controlling the use of removable media such as
USB flash drives – and enforce the ban by using software that will not allow
unauthorized drives to be accessed when plugged in.
[SOURCE: Ernst  Young]
Worst case scenario
An international oil and gas company
lost an unencrypted laptop containing
the personal information of 13,000 US
individuals including their names, Social
Security numbers and addresses. The
sting in the tail? The information lost
was for claimants who had already filed
against the company...
Take extra care...
… and consider controlling the use of removable media such as
USB flash drives – and enforce the ban by using software that will not allow
unauthorized drives to be accessed when plugged in.
[SOURCE: Ernst  Young]
Scorched Earth Policy
Always have the ability to remotely wipe
lost or stolen devices available to you as
your last line of defense...
Worst case scenario
An international oil and gas company
lost an unencrypted laptop containing
the personal information of 13,000 US
individuals including their names, Social
Security numbers and addresses. The
sting in the tail? The information lost
was for claimants who had already filed
against the company...
Take extra care...
… and consider controlling the use of removable media such as
USB flash drives – and enforce the ban by using software that will not allow
unauthorized drives to be accessed when plugged in.
“Being Human”
Remember: serious data leakage could be caused by something as simple as sending
an email to the wrong person by accident (auto-complete in the ‘To:’ field has made
slips ups easier than ever). Help employees care about data compliance and leakage:
“Being Human”
Remember: serious data leakage could be caused by something as simple as sending
an email to the wrong person by accident (auto-complete in the ‘To:’ field has made
slips ups easier than ever). Help employees care about data compliance and leakage:
Create clear, understandable
policies that list prohibited
behaviors and what is expected
from employees when it comes to
handling company data
“Being Human”
Remember: serious data leakage could be caused by something as simple as sending
an email to the wrong person by accident (auto-complete in the ‘To:’ field has made
slips ups easier than ever). Help employees care about data compliance and leakage:
Create clear, understandable
policies that list prohibited
behaviors and what is expected
from employees when it comes to
handling company data
Provide regular mandatory training on
security awareness for employees –
especially for those who are regularly
handling highly sensitive data
“Being Human”
Remember: serious data leakage could be caused by something as simple as sending
an email to the wrong person by accident (auto-complete in the ‘To:’ field has made
slips ups easier than ever). Help employees care about data compliance and leakage:
Create clear, understandable
policies that list prohibited
behaviors and what is expected
from employees when it comes to
handling company data
Avoid long, waffly checklists of
dos and don’ts that don’t engage
employees but simply turn them off
Provide regular mandatory training on
security awareness for employees –
especially for those who are regularly
handling highly sensitive data
“Being Human”
Remember: serious data leakage could be caused by something as simple as sending
an email to the wrong person by accident (auto-complete in the ‘To:’ field has made
slips ups easier than ever). Help employees care about data compliance and leakage:
Create clear, understandable
policies that list prohibited
behaviors and what is expected
from employees when it comes to
handling company data
Avoid long, waffly checklists of
dos and don’ts that don’t engage
employees but simply turn them off
Provide regular mandatory training on
security awareness for employees –
especially for those who are regularly
handling highly sensitive data
If a new data threat emerges, keep
staff informed so they know what to
look for
Return to our Cyber Hub for more
useful content
VISIT NOW!

More Related Content

PPT
Managing insider threat
PPTX
Case study presentation
PDF
DATA PROTECTION & BREACH READINESS GUIDE 2014
PDF
InformationSecurity_11141
PDF
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
PDF
2010 report data security survey
PDF
IRJET- Data Leak Prevention System: A Survey
PDF
wp-us-cities-exposed
Managing insider threat
Case study presentation
DATA PROTECTION & BREACH READINESS GUIDE 2014
InformationSecurity_11141
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
2010 report data security survey
IRJET- Data Leak Prevention System: A Survey
wp-us-cities-exposed

What's hot (20)

PDF
The Top Ten Insider Threats And How To Prevent Them
PDF
Cybersecurity: The New Priority for Business
PDF
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
PDF
A foundation for breach data analysis
PDF
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
PDF
2014 ota databreachguide4
PPTX
Corporate Data: A Protected Asset or a Ticking Time Bomb?
PDF
Portal Authentication: A Balancing Act Between Security Usability and Complia...
PDF
5 Technology Trends Construction Contractors Can't Afford To Ignore
PDF
The growing mandatory requirements to protect data- secure PostgreSQL
PDF
Keep Student information protected while improving services
PDF
PGConf APAC 2018: Sponsored Talk by Fujitsu - The growing mandatory requireme...
PDF
White Paper - Nuix Cybersecurity - US Localized
PDF
3rd Part Cyber Risk Report - 2018
PDF
WhiteHat’s Website Security Statistics Report 2015
PDF
Cybersecurity update 12
PPTX
Data Security for Nonprofits
PDF
Forcepoint Whitepaper 2016 Security Predictions
PDF
Top 6 things_small_businesses_q12015
PDF
Secure Wall - how should companies protect themselves from cyber crime?
The Top Ten Insider Threats And How To Prevent Them
Cybersecurity: The New Priority for Business
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
A foundation for breach data analysis
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
2014 ota databreachguide4
Corporate Data: A Protected Asset or a Ticking Time Bomb?
Portal Authentication: A Balancing Act Between Security Usability and Complia...
5 Technology Trends Construction Contractors Can't Afford To Ignore
The growing mandatory requirements to protect data- secure PostgreSQL
Keep Student information protected while improving services
PGConf APAC 2018: Sponsored Talk by Fujitsu - The growing mandatory requireme...
White Paper - Nuix Cybersecurity - US Localized
3rd Part Cyber Risk Report - 2018
WhiteHat’s Website Security Statistics Report 2015
Cybersecurity update 12
Data Security for Nonprofits
Forcepoint Whitepaper 2016 Security Predictions
Top 6 things_small_businesses_q12015
Secure Wall - how should companies protect themselves from cyber crime?
Ad

Viewers also liked (6)

PPT
Security Services Diagram for PowerPoint by PoweredTemplate.com
PDF
2010 za con_stephen_kreusch
PPTX
How classification augments data loss prevention
PDF
The Definitive Guide to Data Loss Prevention
PPTX
Data leakage detection
PPT
Data loss prevention (dlp)
Security Services Diagram for PowerPoint by PoweredTemplate.com
2010 za con_stephen_kreusch
How classification augments data loss prevention
The Definitive Guide to Data Loss Prevention
Data leakage detection
Data loss prevention (dlp)
Ad

Similar to The CISO’s Guide to Being Human (20)

PPTX
11 19-2015 - iasaca membership conference - the state of security
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PPTX
Microsoft DATA Protection To Put secure.
PDF
Securité : Le rapport 2Q de la X-Force
PDF
IBM X-Force.PDF
PDF
1. introduction to cyber security
PPTX
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
PDF
A Survey On Data Leakage Detection
PDF
5 Questions Executives Should Be Asking Their Security Teams
PDF
DataGravity Security Pop Quiz
PDF
INT 1010 07-4.pdf
PPTX
Need for Data Protection Training - How E-learning Can Help?
PPTX
Information Security For Small Business
PPTX
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
PPTX
Information security
PDF
Potential Advantages Of An Insider Attack
PPSX
November 2017: Part 6
PDF
Data loss prevention by using MRSH-v2 algorithm
PPT
Eileen Presentation
PPTX
Data breach
11 19-2015 - iasaca membership conference - the state of security
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Microsoft DATA Protection To Put secure.
Securité : Le rapport 2Q de la X-Force
IBM X-Force.PDF
1. introduction to cyber security
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
A Survey On Data Leakage Detection
5 Questions Executives Should Be Asking Their Security Teams
DataGravity Security Pop Quiz
INT 1010 07-4.pdf
Need for Data Protection Training - How E-learning Can Help?
Information Security For Small Business
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Information security
Potential Advantages Of An Insider Attack
November 2017: Part 6
Data loss prevention by using MRSH-v2 algorithm
Eileen Presentation
Data breach

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
project resource management chapter-09.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Tartificialntelligence_presentation.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Mushroom cultivation and it's methods.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
A Presentation on Touch Screen Technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Approach and Philosophy of On baking technology
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
Agricultural_Statistics_at_a_Glance_2022_0.pdf
MIND Revenue Release Quarter 2 2025 Press Release
project resource management chapter-09.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Tartificialntelligence_presentation.pptx
A Presentation on Artificial Intelligence
Zenith AI: Advanced Artificial Intelligence
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
1 - Historical Antecedents, Social Consideration.pdf
Mushroom cultivation and it's methods.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
WOOl fibre morphology and structure.pdf for textiles
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A Presentation on Touch Screen Technology
Unlocking AI with Model Context Protocol (MCP)
Approach and Philosophy of On baking technology
OMC Textile Division Presentation 2021.pptx
Enhancing emotion recognition model for a student engagement use case through...
NewMind AI Weekly Chronicles - August'25-Week II

The CISO’s Guide to Being Human

  • 1. The CISO’s Guide to Being Human How to prevent and cope with accidental data leakage
  • 2. The CISO’s guide to being human The issue of data security is becoming ever more pressing for the public and private sectors: • Sensitive data that has been lost or leaked by Britain’s private and public sectors has risen by 1,014% between August 2007 and August 2012 • From 2011/2012, the UK logged 821 data breaches • 58% of IT professionals polled by Computer Weekly admit to not using Data Loss Protection products SOURCE: The Register2012 Verizon Data Breach Investigation Report While malicious hacking is the number one threat to your data security, there is one element that still accounts for making much of it possible – staff making mistakes that can lead to costly data leakage...
  • 3. The CISO’s guide to being human The issue of data security is becoming ever more pressing for the public and private sectors: • Sensitive data that has been lost or leaked by Britain’s private and public sectors has risen by 1,014% between August 2007 and August 2012 • From 2011/2012, the UK logged 821 data breaches • 58% of IT professionals polled by Computer Weekly admit to not using Data Loss Protection products SOURCE: The Register2012 Verizon Data Breach Investigation Report While malicious hacking is the number one threat to your data security, there is one element that still accounts for making much of it possible – staff making mistakes that can lead to costly data leakage... 97% 97% of breaches were avoidable through simple or intermediate controls
  • 4. According to ISACA’s 2012 Governance of Enterprise IT (GEIT) Survey of over 3,700 of its members, of the security challenges that a company is likely to face in the next 12 months:
  • 5. According to ISACA’s 2012 Governance of Enterprise IT (GEIT) Survey of over 3,700 of its members, of the security challenges that a company is likely to face in the next 12 months: 16% 16% will be mistakes made by employees 13% 13% will be incidents relating to employees’ personal devices (BYOD)
  • 6. According to ISACA’s 2012 Governance of Enterprise IT (GEIT) Survey of over 3,700 of its members, of the security challenges that a company is likely to face in the next 12 months: 16% 16% will be mistakes made by employees 13% 13% will be incidents relating to employees’ personal devices (BYOD) VIEW INFOGRAPHIC
  • 7. According to ISACA’s 2012 Governance of Enterprise IT (GEIT) Survey of over 3,700 of its members, of the security challenges that a company is likely to face in the next 12 months: 16% 16% will be mistakes made by employees 13% 13% will be incidents relating to employees’ personal devices (BYOD) But are companies doing enough to tackle data compliance issues? According to the same report: • Nearly 1/4 of respondents said management’s level of involvement in governance is low • 49% of enterprises will be increasing investments in IT over the next 12 months. But will they be increasing their data security budgets too? VIEW INFOGRAPHIC
  • 8. SOURCE: FlashRouters, Mashable While DLP solutions are available, there are several basic lessons that can be instilled into staff to act as your first line of defense against data leakage: • More than 60% of people use the same password across a multitude of accounts; this can make life easy for hackers • Use a secure password generator that will create difficult-to-crack passwords http://www.pctools.com/guides/password/ Facepalm Passwords According to SplashData, the worst passwords of 2012 were: 5. ‘qwerty’ 4. ‘abc123’ 3. ‘12345678’ 2. ‘123456’ 1. ‘password’
  • 9. SOURCE: FlashRouters, Mashable While DLP solutions are available, there are several basic lessons that can be instilled into staff to act as your first line of defense against data leakage: • More than 60% of people use the same password across a multitude of accounts; this can make life easy for hackers • Use a secure password generator that will create difficult-to-crack passwords http://www.pctools.com/guides/password/ Facepalm Passwords According to SplashData, the worst passwords of 2012 were: 5. ‘qwerty’ 4. ‘abc123’ 3. ‘12345678’ 2. ‘123456’ 1. ‘password’ Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months. Clifford Stoll, data security guru
  • 10. “Speared by phishing” SOURCE: Websense, Mashable SOURCE: Verizon Spear-phishing is the latest trend in sucker- punching naive employees; it’s the specific targeting of particular groups or individuals via socially-engineered content: • Combat phishing through employee education. Facebook holds an annual ‘Hacktober’ where employees are treated to simulated security threats for a month. Those who report fake phishing attempts and other security attacks are given prizes – while those who fail to do so are given further training.
  • 11. “Speared by phishing” SOURCE: Websense, Mashable SOURCE: Verizon Spear-phishing is the latest trend in sucker- punching naive employees; it’s the specific targeting of particular groups or individuals via socially-engineered content: • Combat phishing through employee education. Facebook holds an annual ‘Hacktober’ where employees are treated to simulated security threats for a month. Those who report fake phishing attempts and other security attacks are given prizes – while those who fail to do so are given further training. 84% 84% of victims unknowingly possessed evidence of a breach in their logs 2012 Verizon Data Breach Investigation Report
  • 12. Research has revealed that half of the surveyed companies had lost a device with important business data on it, causing security implications for over a fifth of organizations. If correct encryption procedures had been followed, such security implications would have been eliminated. [SOURCE: Business Computing World]
  • 13. Research has revealed that half of the surveyed companies had lost a device with important business data on it, causing security implications for over a fifth of organizations. If correct encryption procedures had been followed, such security implications would have been eliminated. [SOURCE: Business Computing World] Encrypt laptops, mobile devices and removable media to ensure that if tech is lost out in the field (or in a pub), its data remains inaccessible.
  • 14. [SOURCE: Ernst Young] Take extra care... … and consider controlling the use of removable media such as USB flash drives – and enforce the ban by using software that will not allow unauthorized drives to be accessed when plugged in.
  • 15. [SOURCE: Ernst Young] Worst case scenario An international oil and gas company lost an unencrypted laptop containing the personal information of 13,000 US individuals including their names, Social Security numbers and addresses. The sting in the tail? The information lost was for claimants who had already filed against the company... Take extra care... … and consider controlling the use of removable media such as USB flash drives – and enforce the ban by using software that will not allow unauthorized drives to be accessed when plugged in.
  • 16. [SOURCE: Ernst Young] Scorched Earth Policy Always have the ability to remotely wipe lost or stolen devices available to you as your last line of defense... Worst case scenario An international oil and gas company lost an unencrypted laptop containing the personal information of 13,000 US individuals including their names, Social Security numbers and addresses. The sting in the tail? The information lost was for claimants who had already filed against the company... Take extra care... … and consider controlling the use of removable media such as USB flash drives – and enforce the ban by using software that will not allow unauthorized drives to be accessed when plugged in.
  • 17. “Being Human” Remember: serious data leakage could be caused by something as simple as sending an email to the wrong person by accident (auto-complete in the ‘To:’ field has made slips ups easier than ever). Help employees care about data compliance and leakage:
  • 18. “Being Human” Remember: serious data leakage could be caused by something as simple as sending an email to the wrong person by accident (auto-complete in the ‘To:’ field has made slips ups easier than ever). Help employees care about data compliance and leakage: Create clear, understandable policies that list prohibited behaviors and what is expected from employees when it comes to handling company data
  • 19. “Being Human” Remember: serious data leakage could be caused by something as simple as sending an email to the wrong person by accident (auto-complete in the ‘To:’ field has made slips ups easier than ever). Help employees care about data compliance and leakage: Create clear, understandable policies that list prohibited behaviors and what is expected from employees when it comes to handling company data Provide regular mandatory training on security awareness for employees – especially for those who are regularly handling highly sensitive data
  • 20. “Being Human” Remember: serious data leakage could be caused by something as simple as sending an email to the wrong person by accident (auto-complete in the ‘To:’ field has made slips ups easier than ever). Help employees care about data compliance and leakage: Create clear, understandable policies that list prohibited behaviors and what is expected from employees when it comes to handling company data Avoid long, waffly checklists of dos and don’ts that don’t engage employees but simply turn them off Provide regular mandatory training on security awareness for employees – especially for those who are regularly handling highly sensitive data
  • 21. “Being Human” Remember: serious data leakage could be caused by something as simple as sending an email to the wrong person by accident (auto-complete in the ‘To:’ field has made slips ups easier than ever). Help employees care about data compliance and leakage: Create clear, understandable policies that list prohibited behaviors and what is expected from employees when it comes to handling company data Avoid long, waffly checklists of dos and don’ts that don’t engage employees but simply turn them off Provide regular mandatory training on security awareness for employees – especially for those who are regularly handling highly sensitive data If a new data threat emerges, keep staff informed so they know what to look for
  • 22. Return to our Cyber Hub for more useful content VISIT NOW!