This book contains a lot of material about information security, is replete with statistics, examples and money. The book provides step-by-step recommendations for protecting a company.
As in the previous parts, I focus on a systematic approach, avoiding the classic mistake of focusing on technology and expecting a miracle from them. The book shows how information security is related to processes, competencies, internal communication, lean manufacturing and project management.
mid-October 2021, the hacker gained access to the Argentine government’s database, which contains information on all citizens’ identity cards. As a result, on the black-market data and ID-cards of the entire population of Argentina, that is, more than 45 million citizens were put on sale. Moreover, as a confirmation of the data, the hacker disclosed information about 44 known personalities