What is it?
The act or process of making a network, data repository, sensor, computer system, software, or other equipment resistant to unauthorized access or damage.
Why is it important?
Unauthorized access is one of the primary catalysts for operational, financial, strategic, legal, and other damage to an organization. These breaches also increase the risk of harm to third parties, including customers, patients, and other stakeholders. Hardening hardware, software, and data systems is a key risk mitigation strategy.
...continue reading "Term of the Week: Hardening"