article thumbnail

Five Strategies to Protect Against Ransomware and Other Cyberattacks

Risk Management Monitor

Strengthen Asset Inventory You cannot protect what you do not know exists or cannot see. Having an efficient asset management program can significantly increase visibility and rapidly provide detailed information about systems in the event of a cyberattack.

Alert 76
article thumbnail

The Colonial Pipeline Hack: Failure in Risk Management

LogisManager

Having multi-factor authentication also limits unauthorized users to access data. Asset Management. This can be mitigated with clear policies requiring attestation by users and ensuring corporate devices have a two-factor authentication to access sensitive data. Data Governance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT Audit Checklist for Your IT Department

Reciprocity

Do you require multi-factor authentication? Best practices suggest that the inventory be maintained in an asset management system with a configuration management database (CMDB). Review critical network security practices, too. For example, do remote workers connect to your network via a VPN?

Audit 52
article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

IA – Identification and Authentication : Verifying the identity of users and devices. IR – Incident Response : Responding to and managing security incidents. Identify: Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. Manage remote access.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

IA – Identification and Authentication : Verifying the identity of users and devices. IR – Incident Response : Responding to and managing security incidents. Identify: Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. Manage remote access.