Перейти к содержанию сайта
Cybersecurity for Executives
Book

Cybersecurity for Executives

A Practical Guide

Wiley, 2014 подробнее...

Buy book or audiobook

автоматическое преобразование текста в аудио
автоматическое преобразование текста в аудио

Editorial Rating

8

Qualities

  • Innovative
  • Applicable

Recommendation

Today’s executives must become adept at managing cybersecurity risk. You don’t need to learn the latest software patches or the intricacies of Estonian hack attacks. However, tech experts Gregory J. Touhill and C. Joseph Touhill say you do need to be aware of ever-evolving cybercrime, and know which questions to ask and how to manage a cybersecurity staff. The authors smoothly translate technical material for laypeople, including anecdotes and easy-to-digest checklists. Their practical guide offers step-by-step instructions for everything from managing passwords to dealing with a cybersecurity crisis in case you get hacked. getAbstract recommends this guide to any CEO, CIO, manager, entrepreneur or self-employed professional who needs to understand this constant danger.

Summary

The Risk Checklist

Hackers pose a constant threat. Criminals and foreign adversaries have targeted and attacked Google, Sony, Dow Chemical and the US government. They’ve victimized prominent brands like Coca-Cola, and lesser-known organizations such as the Midwestern grocery chain Schnucks. While attacks against big-name corporations grab the headlines, cyberattacks increasingly victimize small businesses. Cybercrime costs more than $100 billion a year. It is big business, and the criminals are technologically sophisticated, socially adept and in cahoots with organized crime. If you operate in the modern economy, cybercriminals pose a risk. No industry, geographic area or business profile is immune.

Beware of these sources of vulnerability:

  • “Intellectual property and trade secrets” – Keep sensitive information off your computers. Make sure secrets stay off cellphones. Secrets are safest offline, on old-fashioned paper.
  • Rivals – Most of your rivals compete fairly, but unscrupulous competitors may hire spies to steal your corporate secrets.
  • Computer storage – The standard practice of storing records and data on computers...

About the Authors

Cybersecurity and information technology consultant Gregory J. Touhill is an adjunct professor at Washington University in St. Louis. C. Joseph Touhill is a corporate CEO and board member.


Comment on this summary