5. EFFECTIVE BACKUP SOLUTIONS
Backups are essential for remediating malicious activity and ensuring business continuity in the event of an attack. Having a regular backup solution also addresses concerns about whether you and your customers have ready access to the latest versions of business applications and data.
This is especially critical for organizations that must meet certain compliance mandates, such as HIPAA or PCI-DSS.
6. ACCESS PRIVILEGE REVIEWS
In every business, there’s churn. Between on-boarding, off-boarding, and lateral moves within an organization, you should regularly review which team members have access to mission-critical data, applications, and sensitive network locations. You may discover a number of employees who once required access to certain systems or files no longer do. Leaving those systems open to folks who don’t really need them (or, worse, have left the company!) can be a major security risk.
Cull your lists and do regular audits to make sure employees’ access is based on “need to know,” i.e. they have only the level of access necessary for them to do their jobs.