Cyber security: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
(Mend link.)
(Add links.)
 
(One intermediate revision by the same user not shown)
Line 16: Line 16:
*[[Cyber security: protecting your business and your clients]]
*[[Cyber security: protecting your business and your clients]]
*[[Dark web]]
*[[Dark web]]
*[[Encryption]]
*[[Homomorphic encryption]]
*[[ICAEW]]
*[[ICAEW]]
* [[Outside-in cyber review]]
* [[Outside-in cyber review]]
Line 21: Line 23:


==Other resources==
==Other resources==
*[https://www.treasurers.org/hub/technical/cyber-security-guide-2024 Cyber security in corporate finance - ACT & ICAEW]
*[https://www.treasurers.org/hub/technical/cyber-security-guide-2024 Cyber security in corporate finance - ACT, ICAEW and others]
*[https://www.treasurers.org/hub/treasurer-magazine/why-humans-are-the%E2%80%93weakest-link-in-cybersecurity Why humans are the weakest link in cybersecurity, The Treasurer Web exclusive, 2019]
*[https://www.treasurers.org/hub/treasurer-magazine/why-humans-are-the%E2%80%93weakest-link-in-cybersecurity Why humans are the weakest link in cybersecurity, The Treasurer Web exclusive, 2019]


[[Category:The_business_context]]
[[Category:The_business_context]]

Latest revision as of 05:18, 6 September 2024