• Physical Devices
  • Software
  • Data
  • Trade Secrets
  • Employees

Threat Agents can damage the above:

  • Fires
  • Floods
  • Tornadoes
  • Hackers
  • Malware

To mitigate risks ask these questions:

What are the critical Assets?

What business procesees require them assets?

What could interfear with normal operations?

What are the risks?

Which ones present the highest and negative outcomes and should be prioritized?

Which is the most cost effective way of reducing the risks?

Each year, Verizon publishes the Verizon Data Breach Investigations Report (DBIR), which summarizes cybersecurity data, trends, and issues over the past year.

Verizon Data Breach Study