{"title":"你有太多的安全措施吗?","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(23)70013-5","DOIUrl":null,"url":null,"abstract":"Organisations seem to accumulate cyber security solutions, to the point where they become difficult to use and it becomes impossible to ensure that they are operating efficiently. The result can be unnecessary and expensive duplication as well as unseen gaps that leave you vulnerable to attack.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"43 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Do you have too much security?\",\"authors\":\"Steve Mansfield-Devine\",\"doi\":\"10.12968/s1353-4858(23)70013-5\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Organisations seem to accumulate cyber security solutions, to the point where they become difficult to use and it becomes impossible to ensure that they are operating efficiently. The result can be unnecessary and expensive duplication as well as unseen gaps that leave you vulnerable to attack.\",\"PeriodicalId\":100949,\"journal\":{\"name\":\"Network Security\",\"volume\":\"43 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Network Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1353-4858(23)70013-5\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1353-4858(23)70013-5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Organisations seem to accumulate cyber security solutions, to the point where they become difficult to use and it becomes impossible to ensure that they are operating efficiently. The result can be unnecessary and expensive duplication as well as unseen gaps that leave you vulnerable to attack.