Hacked? Don't waste time pointing fingers
Cybersecurity attacks, data breaches and hacking can be devastating and demoralizing to a company, leaving it with a difficult question: What now? Too often, companies focus on the who-dunit of a cyberattack. They want to attribute the data breach or cybersecurity incident to a specific actor, a villain. Yet focusing an internal investigation on identifying the source of a data breach of cybersecurity attack is often an inefficient use of company’s time and resources.
Full Article Below:
This page is for general information purposes. JAMS makes no representations or warranties regarding its accuracy or completeness. Interested persons should conduct their own research regarding information on this website before deciding to use JAMS, including investigation and research of JAMS neutrals. See More