The persons attempting to compromise the system are looking for weak points in your information/cyber security posture. This includes, depending on the circumstances, your employees, updates to the computer system, points where the information is being transferred, wireless access, and other points of interest to them. Data can be transferred via Wi-Fi, email, thumb drives and other avenues. Each of these represent a point of potential weakness that could be breached. These and other areas should be tested to ensure compliance with HIPAA, HITECH, PCI, GLBA, or other relevant to your industry regulation.
Call us for additional information and personalized quote.
Miel, LLC Infosec Consulting
Penetration Testing and Vulnerability Assessment
810-701-5511
It is not about winning or losing, but reorienting yourself to the real problem-managing the risk across the enterprise.
No comments:
Post a Comment