Ashley Madison Extortion Attack: Critical Lessons For Enterprise Cybersecurity

Organizations already know to protect personal information of customers and employees, intellectual property secrets, passwords, private keys, and the like – information that a hacker seeking financial gain would covet. But an extortionist will be seeking confidential information that simply has the power to embarrass your organization, regardless of any potential financial value.

What feeling does this article give you?
Joy
Disgust
Fear
Anger
Sadness

#hashtags to follow:

Organizations [+]   

More from #economy