Bruce’s Shorts | 4.11 - Data Security

What are the top ten threats to your company data? In this episode of Bruce’s Shorts, Bruce Devlin runs through the list in under 3 minutes.
Watch the video to hear more abouts these top ten treats:
10. Insider attacks
9. Lack of contingencies plans
8. Poor configuration
7. Reckless use of hotel networks
6. Reckless use of wireless hotspots
5. Data lost on a personal device
4. Web server compromised
3. Reckless surfing by employees
2. Malicious HTML email
1. Automated exploit of known vulnerabilities
You will be hacked; how do you survive it? How do you protect your data? Find out in the next episode of Bruce’s Shorts.
You might also like...
Building Software Defined Infrastructure: Observability In Microservice Architecture
Building dynamic microservices based infrastructure introduces the potential for variable latency which brings new monitoring challenges that require an understanding of observability.
Broadcast Standards: Kubernetes & The Architecture Of Cloud Compute Based Systems
Here we describe Kubernetes and the taxonomy of containerized architecture based cloud compute system designs it manages.
Live Sports Production: Backhaul In Live Sports Production
Getting content reliably and securely from venue to studio remains key to live sports production so here we discuss the technology and services required.
Monitoring & Compliance In Broadcast: Monitoring Delivery In The Converged OTA – OTT Ecosystem
Convergence or coexistence between linear broadcast, IP based delivery and 5G mobile networks creates new challenges for monitoring of delivery paths, both technically and logistically.
IP Monitoring & Diagnostics With Command Line Tools: Part 4 - SSH Public Keys
Installing public SSH keys created on your workstation in a server will authenticate you without needing a password. This streamlines the SSH interaction and avoids the need to use stored and visible passwords in your scripts.