| | |
|
|
|
| | |
|
| |
|
| |
Initial Steps To Secure Your Environment |
Every organization has different levels of risk that they are willing accept.
The less risk you are willing to take, the more it costs to reduce the risk to that level.
Luckily, a significant level of risk can be reduced easily and without a lot of cost and so at a minimum an organization should consider the following items:
|
| |
* | Use a layered security controls approach, also called defense in depth. - gateway, hardened servers/workstations, segmentation, encryption, user awareness, MFA, anti-malware etc. |
* | Have an incident response and business continuity plan. - for if/when something does happen |
* | Implement security patches as soon as you can. - if you have heard about the vulnerability, the hackers have too. |
* | Regularly test for weaknesses. - There are plenty of free tools out there if you know what you're looking for, and periodically hire a professional to confirm your controls. |
|
|
Intelligent Security Solutions |
for Enterprise Networks |
|
- Ethical Hacking
- Vulnerability Assessment, Penetration Testing, Social Engineering, Phishing Simulation, IT and OT (ICS/SCADA)
- Managed Security Services
- IPS, Firewall, Logging and Reporting, Anomaly Detection
- Planning and Architecture
- Incident Response Procedure, Disaster Recovery, Business Continuity, Recovery
- Breach Investigation
- Incident Forensics, Data Recovery
- Regulatory Compliance
- PCI DSS, PIPEDA, FIPPA, PHIPA, GDPR, C-SOX
- Contact
- Tassah - Advanced Network Security
|
| |