-
May 21st, 2018, 06:08 PM
#1
Junior Member
What are best practices to protect critical systems ?
Appreciate some good practices to protect critical systems in retail sector especially telecom industry, any feedback / inputs appreciated.
-
May 21st, 2018, 06:47 PM
#2
Junior Member
- Perform a Business Impact Assessment
- Categorize and risk rate your critical systems and assets
- Proper network segmentation
- Strong firewall governance
- Patch management
all must-do basics.
-
May 22nd, 2018, 02:38 AM
#3
Junior Member
Network segmentation, Security Layers, Traffic Visibility mechanism to quickly identify abnormal activity/volume and a robust DR policies to bring systems up while mitigating issues may help.
Identifying what is critical itself would be a big task as for everyone their own system is critical. However, when a dedicated Crisis management system decides depending on the weighted importance of Business Operations, Revenue and Communications a clear picture emerges and SLA, SOPs are put in place for remediation efforts.
A team that is skilled, trained on latest technologies would help mitigate issues as soon as possible for an effective resolution.
-
September 24th, 2018, 10:52 PM
#4
Junior Member
It really depends on what you are trying to protect. Sensitive data, then a combination of access controls, network segmentation, and data encryption. Physical assets, then vulnerability management would be one I would recommend. Really having a "base" level of hygene and process for protection and detection are table stakes in this day and age.
-
October 9th, 2018, 09:53 AM
#5
Junior Member
Here are some things I recommend doing to keep your system up:
-Turn on Automatic Updates for your operating system.
-Be suspicious of any official-looking email message or phone call that asks for personal or financial information.
-Use long passwords - 20 characters or more is recommended.
-For desktop computers, shut-down the system when not in use - or lock your screen.
-Securely remove sensitive data files from your system when they are no longer needed.
-Only install apps from trusted sources.
-Monitor your accounts for suspicious activity.
-Be careful of what you share on social networking sites.
-Don't forget to Back up your data.
Hope this helped : )
Similar Threads
-
By intruder in forum Programming Security
Replies: 2
Last Post: April 18th, 2012, 08:51 PM
-
By mrlucifer in forum Microsoft Security Discussions
Replies: 32
Last Post: June 17th, 2006, 04:32 PM
-
By fizzie in forum *nix Security Discussions
Replies: 6
Last Post: July 28th, 2002, 08:44 AM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|