Forums
New posts
Articles
Product Reviews
Policies
FAQ
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Menu
Log in
Register
Install the app
Install
Forums
General Discussions
Security Awareness
Cyber Security Career
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="McBie" data-source="post: 1610481" data-attributes="member: 54417"><p>I would like to suggest the following approach to get you started.</p><p>1) Understand your business environment and IT technical infrastructure - IN this case your Mac</p><p>2) Understand the current vulnerabilities in your business environment and IT infrastructure </p><p>3) Understand the threats that exploit the identified vulnerabilities and could potentially interrupt your business processes ( through IT technology )</p><p>4) Identify the likelihood of an identified threat exploiting your vulnerabilities - use statistics from insurance companies and cyber security firms ( loads available )</p><p>5) Identify any compensating controls you have already in place to reduce the likelihood of an exploit AND the impact of the threat should it materialise.</p><p>6) Re- assess the likelihood taking into account the compensating controls.</p><p>7) Assign a priority to the identified risk and propose mitigating actions ( accept the risk, reduce likelihood, reduce impact, eliminate the risk ( this may be the same as stop doing business completely ))</p><p></p><p>To get your brain started .....</p><p>I am running my complete business on a 7 year old Mac ( never failed me before ) running 10.9.1 using Word processing and Spreadsheets, E-mail and Internet browsing.</p><p>That is all the technical infrastructure I have available.</p><p></p><p>Vulnerabilities ?</p><p>Threats ?</p><p>Likelihood ?</p><p>Risk ?</p><p></p><p>As a hint ..... my data means everything to me. No data, no revenue.</p><p></p><p>;D <img src="/mac_images/images/smilies/Innocent.png" class="smilie" loading="lazy" alt="O:)" title="Innocent O:)" data-shortname="O:)" /></p><p></p><p>Cheers ... McBie</p></blockquote><p></p>
[QUOTE="McBie, post: 1610481, member: 54417"] I would like to suggest the following approach to get you started. 1) Understand your business environment and IT technical infrastructure - IN this case your Mac 2) Understand the current vulnerabilities in your business environment and IT infrastructure 3) Understand the threats that exploit the identified vulnerabilities and could potentially interrupt your business processes ( through IT technology ) 4) Identify the likelihood of an identified threat exploiting your vulnerabilities - use statistics from insurance companies and cyber security firms ( loads available ) 5) Identify any compensating controls you have already in place to reduce the likelihood of an exploit AND the impact of the threat should it materialise. 6) Re- assess the likelihood taking into account the compensating controls. 7) Assign a priority to the identified risk and propose mitigating actions ( accept the risk, reduce likelihood, reduce impact, eliminate the risk ( this may be the same as stop doing business completely )) To get your brain started ..... I am running my complete business on a 7 year old Mac ( never failed me before ) running 10.9.1 using Word processing and Spreadsheets, E-mail and Internet browsing. That is all the technical infrastructure I have available. Vulnerabilities ? Threats ? Likelihood ? Risk ? As a hint ..... my data means everything to me. No data, no revenue. ;D O:) Cheers ... McBie [/QUOTE]
Verification
Name this item 🌈
Post reply
Forums
General Discussions
Security Awareness
Cyber Security Career
Top