In an environment where system failures, theft and sabotage are as easy as a keystroke, the protection and continuity of your business involves a new type of technology and thinking. You are being asked to solve problems that didn't exist a few years ago and threats that may be as new as this morning. In addition, you may be asked to plan for threats that may not yet exist. So, how can you do that? This article addresses some of the newer threats and how to approach them. First, I will address whether your organization is at risk, what these new threats may look like and finally, what your options are.
Tuesday, 20 November 2007 23:30