Page 24 - index
P. 24







Businesses with sensitive information must seek other defenses
As we have seen in other industries, this is likely the tip of the iceberg. In nearly every vertical,
data has become a key asset in the everyday functioning of a business. Hackers know that
while data is valuable, it can be worth a lot more on the black market.

What businesses must remember is that it only takes one successful infiltration to compromise
the network. Security tools that give businesses the means to monitor, detect and respond to
attacks after they make it into the network are critical for network safety. Proper user protocol is
important (such as changing passwords and codes after an employee leaves a company), but
technology provides the safety net that will keep business and consumer data out of the wrong
hands.


One can only sit here and imagine what the New England Patriots are doing as far as cyber
maneuvers to gain an advantage against opponents but I suspect it’s more sophisticated than
the above. Sometimes security is so deflating!

About the Author:

Todd Weller, VP, Corporate Development, joined Hexis Cyber Solutions
in March 2014. His responsibilities include analyst relations, competitive
and market intelligence, corporate visibility, M&A, and strategic
partnership development. Todd draws on his 17+ years of experience as
an equity research analyst where he covered the security industry for
much of that time. In his equity research career Todd provided research
coverage of over 60 companies across several technology sectors,
including security, infrastructure software, data center/cloud hosting, and
healthcare IT.

Connect with Hexis online: http://www.hexiscyber.com/

Hexis Blog: http://www.hexiscyber.com/blog

Twitter: @hexis_cyber

LinkedIn: https://www.linkedin.com/company/hexis-cyber-solutions
















24 Cyber Warnings E-Magazine – July 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   19   20   21   22   23   24   25   26   27   28   29