Who owns cybersecurity in your organization? Do you know? In many organizations, the risk of cyber breaches falls squarely into the IT department. But is that sufficient?
We think about cyberattacks as being direct hits on our databases, but that is so 2010. Today, sophisticated criminal attacks rarely come through the front door. Instead, they use third party entry points both directly and indirectly. Even worse, our employees – wittingly or unwittingly – sometimes walk our data out of the virtual building and into the hands of others.