Date Added: Jun 2009
Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. The author saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friends' computers and from there spread to other devices via shared floppy disks. This kind of part practical joke?]part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of today's cybercrime. In this guide, the author will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats.