Vulnerabilities are constantly found by malicious individuals and researchers, and new software is introduced to them. System components, processes, and custom applications should be periodically reviewed to ensure an evolving environment continues to represent security controls.
Logging systems and monitoring user behaviors are important to prevent, identify or mitigate the effect of a data compromise. The availability of logs in all environments makes it possible to monitor, warn and evaluate thoroughly when something goes wrong.
Assigning each person with access to a unique identity (ID) ensures that each individual has specific accountability for their actions. When such accountability is in place, critical data and system activities are carried out by established and approved users and procedures and can be tracked accordingly.
Malicious software, commonly referred to as "malware" including worms, viruses and trojans, reaches the network during a number of business-approved activities, including employee email and Internet usage, mobile phones, and storage devices, resulting in system vulnerabilities being exploited.
Want to stay up to date with the latest news?
We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!