Keep Records of Partners, Vendors, Contracts, SLA's.Have an up-to-date inventory of Internet Connected Operational Devices.Have an up-to-date inventory of mobile devices and tablets.Have an up-to-date inventory of Workstations and Servers.Have an up-to-date inventory of network devices and connections.Manage Your Risk Open Manage Your Risk Submenu.Custom made or internally developed software and hardware.Evaluate and test these plans every year.Install fall-back capabilities for utilities (electricity, phone, internet…).Include Redundancy and Failover into your architecture.Create a business continuity plan to preserve business.Organise Cyber Security Awareness Campaigns.Get users to subscribe to your code of conduct & policies.Evaluate the security skills of your staff members.Train your users in recognizing phishing.Train your employees in recognizing CEO fraud.Publish a Responsible Disclosure policy.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |