CYBERSECURITY
Honey pots – decoy devices or systems designed to look like commercially sensitive data repositories or network elements – can improve detection of cybersecurity breaches, says telecommunications service provider Saicom Voice Services chief technology officer Greg de Chasteauneuf. Cyberattackers are often present on networks that they have infiltrated for lengthy periods before carrying out an attack. During this time, they explore the compromised network, often relatively freely, to identify potentially commercially sensitive information or vulnerable systems.
This content is only available to subscribers.
Forgot your password? Click here
Don't have any login details?
Free Trial Access