O'Reilly logo

Seven Deadliest Microsoft Attacks by Naomi Alpern, Mike Borkin, Brian Barber, Rob Kraus

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Third Defensive Layer: Form the Protective Circle

You have done your best to plan, and your servers and workstations are patched to the best of your ability. If an attacker were to make it through to your platform, despite your best efforts, you need to ensure that your most valuable assets are protected. When a herd of elephants is threatened, the adults form a protective circle around the young calves. They put their most valuable assets inside the circle and will defend these assets with their lives.

Traveling back from the African savannah into realm of IT security, your data is your organization's most valuable asset and you have a multitude of defenses at your disposal. The two most prominent methods have already been written about in ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required