Business Continuity Management / Disaster Recovery , Fraud Management & Cybercrime , Incident & Breach Response

The Return of the Luddite: Securing Critical Systems

Also, Hacking Air-Gapped IT Systems Over the Internet
The Return of the Luddite: Securing Critical Systems

The latest edition of the ISMG Security Report leads off with a look at why organizations turn to paper when critical systems can't be secured.

Also in the Security Report, you'll hear (click on player beneath image to listen):

The ISMG Security Report appears on this and other ISMG websites on Tuesdays and Fridays. Check out our June 16 and June 20 reports that respectively analyze how the WannaCry worm continues to attack unpatched systems at increasing rates and the apparent death of the Neutrino exploit kit.

The next ISMG Security Report will be posted on Tuesday, June 27.

Theme music for the ISMG Security Report is by Ithaca Audio under a Creative Commons license.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.