1. Data Recovery 2. Data Protection 3. Controlled Access Based on the Need to Know
Cyber Risk Assessment for Asset Type "USERS"
1. Account Monitoring and Control 2. Controlled Use of Administrative Privileges
Cyber Risk Assessment for Asset Type "NETWORK"
1. Maintenance, Monitoring and Analysis of Audit Logs 2. Email and Web Browser Protections 3. Secure Configuration for Network Devices, such as Firewalls, Routers and Switche 4. Boundary Defense 5. Wireless Access Control
Cyber Risk Assessment for Asset Type "DEVICES"
1. Inventory and Control of Hardware Assets2. Malware Defenses3. Limitation and Control of Network Ports, Protocols, and Services
Cyber Risk Assessment for Asset Type "APPLICATIONS"
1. Inventory and Control of Software Assets 2. Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers 3. Continuous Vulnerability Management 4. Email and Web Browser
Non-Asset Based Cyber Risk Assessment
1. Implement a Security Awareness and Training Program 2. Incident Response and Management
SafeguardingYour Digital World with Expert Cybersecurity Solutions