Selected article for: "live people and work people"

Author: Wolfe, Jennifer C.
Title: Cybersecurity
  • Cord-id: 8mhipgwm
  • Document date: 2020_8_30
  • ID: 8mhipgwm
    Snippet: Cybersecurity threats are unlocked doors opened by vulnerability points left unchecked. As we add new technologies to our organizations, new vulnerabilities are created. As we change the way people work and live using technology, new vulnerability points are formed. As the infrastructure to daily life is more reliant on Internet connections, data clouds, and wireless nodes, the ability for hackers to target central services like transportation, financial services, and health care to wreak havoc
    Document: Cybersecurity threats are unlocked doors opened by vulnerability points left unchecked. As we add new technologies to our organizations, new vulnerabilities are created. As we change the way people work and live using technology, new vulnerability points are formed. As the infrastructure to daily life is more reliant on Internet connections, data clouds, and wireless nodes, the ability for hackers to target central services like transportation, financial services, and health care to wreak havoc or destabilize a region continues to increase.

    Search related documents:
    Co phrase search for related documents
    • Try single phrases listed below for: 1