1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: Create a data recovery plan and secure your network

Discussion in 'Network World' started by RSS, Feb 22, 2016.

  1. RSS

    RSS New Member Member

    We discussed building malware defenses the last time out, but today we’re going to focus on Critical Security Controls 10, 11, and 12 covering data recovery, secure network configuration, and boundary defense.

    It’s unrealistic to think that you can completely avoid cyberattacks and data breaches, so it’s vital to have a proper data recovery plan in place. You can also tighten your defenses significantly by ensuring all of your network devices are properly configured, and by putting some thought into all of your potential network borders.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page