Remove Asset Management Remove Authentication Remove Business Continuity
article thumbnail

The Colonial Pipeline Hack: Failure in Risk Management

LogisManager

Business Continuity. To prevent liabilities when a business continuity event occurs, it’s critical to take a risk-based approach. Having multi-factor authentication also limits unauthorized users to access data. Asset Management. Data Governance.

article thumbnail

IT Audit Checklist for Your IT Department

Reciprocity

Do you require multi-factor authentication? Data backups Data backups should be part of your disaster recovery and business continuity planning, so include a review of how and how often your company backs up critical data. Review critical network security practices, too. Have you implemented password policy best practices?

Audit 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

IA – Identification and Authentication : Verifying the identity of users and devices. IR – Incident Response : Responding to and managing security incidents. Identify: Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. Manage remote access.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

IA – Identification and Authentication : Verifying the identity of users and devices. IR – Incident Response : Responding to and managing security incidents. Identify: Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. Manage remote access.