article thumbnail

The Colonial Pipeline Hack: Failure in Risk Management

LogisManager

Having multi-factor authentication also limits unauthorized users to access data. Asset Management. This can be mitigated with clear policies requiring attestation by users and ensuring corporate devices have a two-factor authentication to access sensitive data. About the Author: Steven Minksy. Data Governance.