Security Threat Prevalence Meter
IT managers should make sure all machines and applications are patched and anti-malware solutions should be up to date.
IT managers should assess vulnerability information to identify exposed systems.
IT managers should consider whether to deploy additional monitoring, monitor existing security solutions more closely, and/or disable vulnerable systems.
IT security officers should work with their organizations to determine potential risks and deploy appropriate safeguards. These safeguards may include implementing temporary policies and deploying temporary fixes or restricting application usage.
IT managers without a full-time security officer should put on their security officer hat if they are responsible for server and endpoint security.
No comments:
Post a Comment