{"id":17552,"date":"2021-08-31T14:00:35","date_gmt":"2021-08-31T17:00:35","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=17552"},"modified":"2021-08-31T13:34:36","modified_gmt":"2021-08-31T16:34:36","slug":"cyber-risk-and-resilience-mitigating-risks-and-business-impact","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/cyber-risk-and-resilience-mitigating-risks-and-business-impact\/","title":{"rendered":"Cyber Risk and Resilience &#8211; Mitigating Risks and Business Impact"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-17553\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2021\/08\/cyber-risk-and-resilience-mitigating-risks-and-business-impact.jpg\" alt=\"Cyber Risk and Resilience - Mitigating Risks and Business Impact\" width=\"145\" height=\"205\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2021\/08\/cyber-risk-and-resilience-mitigating-risks-and-business-impact.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2021\/08\/cyber-risk-and-resilience-mitigating-risks-and-business-impact-106x150.jpg 106w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>KPMG<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> COVID-19 has completely changed the way we work, projects which probably took years have been driven through in weeks. We have seen companies that have taken security risks that they might never have accepted under any other circumstances.<br \/>\nOrganised crime groups have been ruthless and entrepreneurial in exploiting fear, uncertainty and doubt over COVID-19. They have been repurposing phishing and attack infrastructure to build COVID-19 fake websites and scams. Nation states themselves have adapted their own cyber espionage tactics.<br \/>\nIt has been noted in the recent past that ransomwares are more likely on a network which is connected via end-points of employees who are working from home. Further, the ransomware attack itself has shifted to more targeted and effective exploitation models. With double extortion attacks involving stealing of data which is common and at the same time, greater efforts to locate and encrypt online backups.<\/p>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2021\/08\/cyber-risk-and-resilience-mitigating-risks-and-business-impact.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>KPMG R\u00e9sum\u00e9: COVID-19 has completely changed the way we work, projects which probably took years have been driven through in weeks. We have seen companies that have taken security risks that they might never have accepted under any other circumstances. Organised crime groups have been ruthless and entrepreneurial in exploiting fear, uncertainty and doubt over COVID-19. They have been repurposing phishing and attack infrastructure to build COVID-19 fake websites and&hellip; <\/p>\n","protected":false},"author":3,"featured_media":17553,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,6,19,20,112],"tags":[],"class_list":["post-17552","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-livros","category-risco-e-perdas","category-seguranca-da-informacao","category-download"],"views":326,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=17552"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17552\/revisions"}],"predecessor-version":[{"id":17554,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17552\/revisions\/17554"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/17553"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=17552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=17552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=17552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}