Finding source of attacks against critical infrastructure

0
1439 views

How do you make log files of endpoints secure so you can audit and find the source of a cyberattack rapidly, and be sure that the information you are reviewing has not been compromised?

James Barry
80 months ago

2 answers

0

Continue to scan both internally, externally and all 'trusted' vendors dedicated connections for vulnerabilities and address them as identified.

Timothy Smit
74 months ago
Thanks - James 74 months ago
0

Keep track of all the devices connected and of their logs, use SMB protocol, email filters, set up priviled accounts, two factors authentication, enable complex passwords

Paolo Beffagnotti
74 months ago

Have some input?