Cyber attacks have proven to affect the continuity of a business as well as compromising the internal and external data stored within an organisation - consequently, having a reputational and financial impact
This is my last blog in the recent series I have been writing about Protect part of the NIST cybersecurity framework. So far in In this series I have covered Access Control; Awareness and Training; Data Security; Information Protection Processes and Procedures. This concluding blog focuses on Protective Technology.