IN THIS LESSON
A few Things to consider
As an organizations I/T system grows, so does its attack surface. By bringing systems online and connecting trusted systems to untrusted networks, the confidentiality and integrity of those systems and data can become exposed to malicious attackers. Not to worry though, there are a plethora of ways you can mitigate those risks in order to protect your assets, but before we delve into a few best practices, lets explore a few questions you should be thinking about to assess the current state of your security posture:
What are your most critical assets that you want to protect?
What type of layers of protection do you currently have in place?
How do you know if your data is secure and how do you detect whether or not you’ve been breached?
What are your response plans in the event of an incident?
what are your business recovery plans in the event of an incident?
Is proper cybersecurity controls enough?
This is not an exhaustive list of things to consider before bringing your systems online, but it’s a great starting point to determine ways to modify or improve the overall security posture of your most critical systems.