Charlie Maclean-Bristol discusses the issues associated with communications after a cyber-attack, and how to develop a plan that will make a huge difference in an organization’s ability to survive and keep their reputation after a data breach.
“The irony of credential stuffing is that organisations that have not suffered a direct data breach often become indirect victims when their users’ accounts are compromised due to someone else’s data breach”