menu

Finding source of attacks against critical infrastructure

0
1193 views

How do you make log files of endpoints secure so you can audit and find the source of a cyberattack rapidly, and be sure that the information you are reviewing has not been compromised?

James Barry
52 months ago

2 answers

0

Continue to scan both internally, externally and all 'trusted' vendors dedicated connections for vulnerabilities and address them as identified.

Timothy Smit
47 months ago
Thanks - James 47 months ago
0

Keep track of all the devices connected and of their logs, use SMB protocol, email filters, set up priviled accounts, two factors authentication, enable complex passwords

Paolo Beffagnotti
47 months ago

Have some input?