Get maximum visibility before the merger
A survey from West Monroe Partners that found that 40% of acquiring companies discovered a cybersecurity problem in an acquired company—after a deal went through. It probably shouldn’t be surprising that, in a 2014 survey from Freshfields Bruckhaus Deringer, a staggering 78% of respondents said cybersecurity is not analyzed in-depth as part of due diligence in an acquisition.
If you’re working for a company that’s acquiring—or being acquired—how can you avoid falling into this trap? A host of security pros gave us advice on what to do keep things locked down before, during, and after an acquisition.
Read the entire list here.
The goal with these questions is to assemble a complete view into both networks’ pre-merger state. “When the networks are linked without a DMZ, any malware will begin its lateral movement,” says Paul Kraus, CEO of Eastwind Networks. “So knowing the separate networks’ behaviors will facilitate the understanding of what a combined network should look like. ”