Instead of piling on further, let’s instead learn from Marriott’s experience. (We in the cybersecurity industry should never let a breach go to waste.) This is a mergers and acquisitions (M&A) object lesson and highlights the crucial role cybersecurity validation and audits must play during the due-diligence phase.
In that spirit, below are 10 cybersecurity red flags for companies assessing acquisition infrastructure. If your target meets any of these criteria, it’s probably a good idea to start digging. It’s fair to assume its network may be vulnerable to attack….
Join Us On LinkedIn
Join the Cybersecurity and Incident Response Group on LinkedIn