Bruce’s Shorts | 4.11 - Data Security

What are the top ten threats to your company data? In this episode of Bruce’s Shorts, Bruce Devlin runs through the list in under 3 minutes.

Watch the video to hear more abouts these top ten treats:

10. Insider attacks

9. Lack of contingencies plans

8. Poor configuration

7. Reckless use of hotel networks

6. Reckless use of wireless hotspots

5. Data lost on a personal device

4. Web server compromised

3. Reckless surfing by employees

2. Malicious HTML email

1. Automated exploit of known vulnerabilities

You will be hacked; how do you survive it? How do you protect your data? Find out in the next episode of Bruce’s Shorts.

You might also like...

HDR & WCG For Broadcast: Part 3 - Achieving Simultaneous HDR-SDR Workflows

Welcome to Part 3 of ‘HDR & WCG For Broadcast’ - a major 10 article exploration of the science and practical applications of all aspects of High Dynamic Range and Wide Color Gamut for broadcast production. Part 3 discusses the creative challenges of HDR…

IP Security For Broadcasters: Part 4 - MACsec Explained

IPsec and VPN provide much improved security over untrusted networks such as the internet. However, security may need to improve within a local area network, and to achieve this we have MACsec in our arsenal of security solutions.

Standards: Part 23 - Media Types Vs MIME Types

Media Types describe the container and content format when delivering media over a network. Historically they were described as MIME Types.

Building Software Defined Infrastructure: Part 1 - System Topologies

Welcome to Part 1 of Building Software Defined Infrastructure - a new multi-part content collection from Tony Orme. This series is for broadcast engineering & IT teams seeking to deepen their technical understanding of the microservices based IT technologies that are…

IP Security For Broadcasters: Part 3 - IPsec Explained

One of the great advantages of the internet is that it relies on open standards that promote routing of IP packets between multiple networks. But this provides many challenges when considering security. The good news is that we have solutions…