On Guard or Under the Radar: How Threats Vary by Industry
IT Connection Blog by Amy Larsen DeCarloSummary Bullets: · Not surprisingly, organizations often apply similar security protections and practices to those employed by their industry peers to safeguard what are often very comparable assets, leaving them equally vulnerable or well-protected depending upon the effectiveness of their controls. · While cyber attackers target certain industry-specific, high-value assets such as a manufacturing company’s intellectual property (IP), many of the breaches involve the theft of less valuable resources that are more often left exposed to risk.