Skip to content

360 Degrees Group Inc.

DATA BREACH RESPONSE – A Guide for Business

Secure Your Operations Move quickly to secure your systems and fix vulnerabilities that may have caused the breach. The only thing worse than a data breach is multiple data breaches. Take steps so it doesn’t happen again. Secure physical areas potentially related to the breach. Lock them and change access codes, if needed. Ask your […]

Vulnerability Testing

Vulnerability testing is the process of identifying vulnerabilities within a system. This could be a software system, a physical system, or even a mechanical system, and the testing can be targeted to focus on components that might be technical, physical, or even administrative in their nature. A vulnerability test is very like a risk assessment, […]

WHAT STOPS PEOPLE FROM BUYING ONLINE?

WHAT STOPS PEOPLE FROM BUYING ONLINE? A lack of trust and face-to-face interaction prevents many people from purchasing online. It’s a known fact that consumers require a greater level of trust and confidence when buying online than face to face. When you’re dealing with an unknown shop selling products of unknown quality, trust plays a […]

Protection of People

Often the most vulnerable aspect of your enterprise is not your technology systems, instead it’s the weaknesses introduced by staff that are often the hardest to find yet the most harmful. Your staff might be simply unaware of what their security obligations are, or they might be complacent about security controls or internal procedures because […]

Protection of Systems

When we read about hacking in the news, we usually hear that massive corporates or government departments have been breached and some kind of corporate database has been stolen. We truly live in the age of the data breach , were hackers break into an organization’s infrastructure and purloin millions of records of personal information, […]

Protection of Information

Performing a risk assessment is one of the fundamental tasks you’ll perform when considering which protection mechanisms should be used to defend your information. We looked at risk assessments in Chapter 4, so you should be fairly familiar with how to undertake one of these by now; however, one thing that wasn’t covered back then […]

What Is the Difference Between Privacy and Anonymity?

Privacy and anonymity are two different concepts; however, both are essential in today’s digital world. Privacy means that online communications are confidential and no third party is allowed to intercept them in any way. Following this definition, the main concern of privacy is to keep the content of the online communication private. For example, when […]