1. Endpoint Security
Endpoint Security is a pretty broad term so let’s clarify.
2. STRONG AUTHENTICATION
https://blog.fleetsmith.com/password-security-guide/
3. DATA PROTECTION
4. PATCH MANAGEMENT
5. LEAST PRIVILEGE
6. BACKUP
7. SUPPLY CHAIN SECURITY
Having the most secure environment in the world is useless if your suppliers have no controls and you have your or your customer data stored with them. Hold your suppliers accountable for your data as if it was on your own onsite servers. The big Cloud vendors have whole sections of their portals dedicated to all of regulations they are compliant to – PCI DSS, ISO 27001, HPIAA – the list goes on an on.
8. CYBER INSURANCE / CYBER AWARENESS TRAINING
References / Guides
BSI Future Learning series - In this first episode, we’re diving into the realm of cybersecurity— Join Simon Dewar from BSI Digital Learning and Kala Philip (MAICD, GAICD) from BSI Learning and the incredibly knowledgeable Damien Cantelo from Apollo Secure, who has worked closely with enterprises of all sizes to understand the cyber-threat landscape and guide them to ensure their systems, processes and, most importantly, people are cyber-ready.
Australian sanctions Russian man over Cybersecurity attack
Cybersecurity - get qualified - build cyber governance skills
Spotlight on cyber By AsIC