//////////////////////////////////////////////////////////////////////////
publicised threats such as data theft, identity
theft and financial trojans are also leaving
considerable damages in their wakes.
A cyberattack can do a lot of damage. Beyond
the financial impact of lost data, compromised
identities or having to pay a ransom to recover
data; there is also reputation damage to
consider. People are more reluctant to do
business with an organisation known to have
suffered data losses.
www.intelligentcio.com
FEATURE: THREAT ASSESSMENT
Cybersecurity maturity evaluation
The first port of call for any organisation
should be to evaluate and understand
where their weak points are, not just
currently but in line with their business
strategy too. Current security controls need
to be reviewed frequently in line with the
business trajectory, while also incorporating
any possible digital transformation
strategies. Current and potential gaps
Paul Joliffe, Lead DSM: Security at
T-Systems South Africa
INTELLIGENTCIO
41