2023-Sustainable Industrial Processing Summit
Carter Intl. Symp / Laws & Their Applications

Editors:F. Kongoli, M. McNeil, M. Dibra, M. Nolan, E. Pana, D. Shanley, B. Jedlickova
Publisher:Flogen Star OUTREACH
Publication Year:2023
Pages:72 pages
ISBN:978-1-989820-74-2 (CD)
ISSN:2291-1227 (Metals and Materials Processing in a Clean Environment Series)
CD-SIPS2023_Volume1
CD shopping page

    PROTECTING YOUR CRITICAL COMPANY DATA – KEY SECURITY METHODS OFTEN OVERLOOKED OR VIOLATED

    Samuel Berger1;
    1NFSD, Norco, United States;
    Type of Paper: Keynote
    Id Paper: 352
    Topic: 61

    Abstract:

    Twitter, Microsoft, Target, Ebay, Equifax, JPMorgan Chase, Home Depot, First American Financial Corp., Facebook, eBay, Equifax, Heartland Payment Systems, LinkedIn, Marriott International, Yahoo and countless more have all been victims of major cybercrime [1]. Ransomware has become a well-known household term.  How did cyber criminals become so effective so quickly?  How do you protect your mission critical data and intellectual properties?  How much are cyber criminals costing the world and is this problem going to get even worse [2]?

    The advanced techniques covered in this lecture can be understood by everyone and applied universally.  You do not need to be an IT guru or data specialist or a security administrator to understand and appreciate these concepts, but once you do have this knowledge you can better identify your weaknesses including the people you hire to protect your most valuable assets [3].  You cannot hire and fire security administrators effectively without knowing the right questions to ask and have an understanding of their mission.

    Keywords:

    Data Security; Data Theft; Ransomware Prevention; Data Protection; Intellectual Property Theft; Hacking

    References:

    [1] Biggest Data Breaches in US History (https://www.upguard.com/blog/biggest-data-breaches-us)
    [2] Estimated cost of cybercrime worldwide 2017-2028 (https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide)
    [3] Cybersecurity Best Practices (https://www.cisa.gov/topics/cybersecurity-best-practices)

    Cite this article as:

    Berger S. (2023). PROTECTING YOUR CRITICAL COMPANY DATA – KEY SECURITY METHODS OFTEN OVERLOOKED OR VIOLATED. In F. Kongoli, M. McNeil, M. Dibra, M. Nolan, E. Pana, D. Shanley, B. Jedlickova (Eds.), Sustainable Industrial Processing Summit Carter Intl. Symp / Laws & Their Applications (pp. 61-62). Montreal, Canada: FLOGEN Star Outreach