Our customer had implemented many different systems and applications to automate several different business processes and needed a way to reduce daily login burden.
Our customer realized that the cost of fixing bugs post-deployment was up to 10 times more expensive than dealing with them during design and implementation.
Our customer was facing productivity problems, possible down time due to viruses, and an increased risk of breach of PII.
System administrators maintained a poorly protected database of privileged account passwords for multiple systems with only partial accountability.
Our customer sometimes deliberately (and sometimes accidentally) stored unencrypted customer and employee PII on laptop and desktop computers.
Our customer was storing all their customer’s PII unencrypted in production databases, which were used by front line sales and customer service functions.
Our customer was using their real customer data in test environments, creating data breach potential.
Our customer’s existing policies were out of date. They did not address the latest changes in technology, network architecture, business model, and risk landscape.
The current server security software patch and malicious code protection processes were leaving our customers’ systems with significant security vulnerabilities for an extended period of time
Our customer had not clearly documented where customer data is received from, stored, processed, or transmitted across its major business processes.
Our customer wanted to require everyone who had access to their sensitive data to comply with their corporate information security policy.
© 2016 Cyber Risk Opportunities | Sitemap | Privacy & Terms