Cybersecurity and Financial Asset Protection: Case Studies
One of the most popular risk management strategies goes out to Microsoft’s Zero Trust Model, which requires verification of every user, device, and application regardless of location. It emphasizes strict access controls and continuous monitoring. This model paved the way for Microsoft to further enhance its ability to protect its cloud services and internal infrastructure from cyber threats.
This model could have been beneficial to Sony Pictures, which was attacked by a group that stole sensitive corporate data in 2014. Such data included unreleased films, employee information, and internal communications. When adding an extra verification step for every user and rigorous access controls, sensitive data will be better secured, with fewer chances of unauthorized access to sensitive data.
Response and Recovery
While it is important to focus on preventative measures against cyber-attacks, it is also crucial to prepare a response and recovery plan in case data breaches happen. If ever a cyber attack occurs within your company, here are the steps to take:
- Assemble a response team and follow predefined procedures…