7 tactics for winning the cyber war, Part 4: Identify and protect critical cyber assets

Blog Post

This is the fourth of our 9-part series based on the information from our latest white paper – a complete copy is available by request.

To minimize your cyber risk, it is important to have a clear understanding of what critical information and assets you possess, how they are maintained, and what can be accessed. This includes:

  • Personally identifiable information
  • Protected health information
  • Business information

You also have to understand the different forms of data theft that can occur and where you company is vulnerable.

To learn what falls under each category above, and what critical questions you should be asking, request a copy of our complete white paper "7 tactics for winning the cyber war: Battles strategies for directors and officers."

Jump to Page

McDonald Hopkins uses cookies on our website to enhance user experience and analyze website traffic. Third parties may also use cookies in connection with our website for social media, advertising and analytics and other purposes. By continuing to browse our website, you agree to our use of cookies as detailed in our updated Privacy Policy and our Terms of Use.