| Read Time: < 1 minute | Newsletters

technology lawWhen a computer security breach occurs how should it be handled with customers and clients? Is there immediate public disclosure, or is there first a careful investigation and scrutiny of what occurred and what data was compromised? The proper strategy must be developed preemptively along with related training to instruct employees how to handle the issue. The most forward thinking businesses go a step further and conduct training simulations with employees to simulate cyber attacks and data security breaches.

Read More: Cyber Security Part 2

This article is the second installment of a 3-part series on cyber security.
Read Part 1 here.

Rate this Post

1 Star2 Stars3 Stars4 Stars5 Stars