Poison Pills and Obstacle Courses

A poison pill  is a tactic used by a publicly held company threatened with an unwelcome takeover bid to make itself unattractive to the bidder. Beach obstacles are intended to slow down an invading force. Nationally known IT Security Expert and speaker Mike Foster thinks you should be presenting a wide variety of both to those who would attempt  an invasion of your company through your IT system and keep you  safe not only from  anonymous hackers,  but your own competitors, vendors, customers ,disgruntled former employees, etc.

There is  no single foolproof safeguard to protect your systems  (ask JP Morgan, Home Depot and Target) , but Foster suggests a combination of simple and easy to implement  “poison pills” and “obstacle courses”  that will make hacking your system beyond the capability of the average  hacker and/or not worth the time and trouble of the best ones.   Given the number of your company’s devices that are not on premises makes this doubly important.  The key according to Foster is to get EVERYONE in  your company, especially the remote users, onto the IT security team.    To that end, he has provided the attached list of IT safeguards;  the first three pages are actionable by your entire team.  The last page of tactics requires the involvement of your IT professional.   He suggests you share it with your IT/Risk Management directors….and you might track how many of these tactics  you’re not using.   (Thanks to Mike Foster for this valuable checklist.   There’s a lot more for your executive team at his website  https://www.fosterinstitute.com/it-concerns/ )

Print Friendly, PDF & Email
FacebooktwitterFacebooktwitter

Speak Your Mind

*