Remove Asset Management Remove Authentication Remove Risk Management
article thumbnail

The Colonial Pipeline Hack: Failure in Risk Management

LogisManager

Colonial Pipeline Hack: Failure in Risk Management. With strong Enterprise Risk Management (ERM), nearly 100% of all liabilities can be avoided. ERM fosters effective governance programs that identify and prevent system misconfigurations, poor patch management practices and weak password management.

article thumbnail

Five Strategies to Protect Against Ransomware and Other Cyberattacks

Risk Management Monitor

Strengthen Asset Inventory You cannot protect what you do not know exists or cannot see. Having an efficient asset management program can significantly increase visibility and rapidly provide detailed information about systems in the event of a cyberattack.

Alert 76
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT Audit Checklist for Your IT Department

Reciprocity

Do you require multi-factor authentication? Best practices suggest that the inventory be maintained in an asset management system with a configuration management database (CMDB). Review critical network security practices, too. For example, do remote workers connect to your network via a VPN?

Audit 52
article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

For almost ten years, NIST has been at the forefront of developing comprehensive cybersecurity risk management frameworks. RA – Risk Assessment: Identifying and analyzing risks to organizational operations. IA – Identification and Authentication : Verifying the identity of users and devices. government contractors.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

For almost ten years, NIST has been at the forefront of developing comprehensive cybersecurity risk management frameworks. RA – Risk Assessment: Identifying and analyzing risks to organizational operations. IA – Identification and Authentication : Verifying the identity of users and devices. government contractors.