menu

Finding source of attacks against critical infrastructure

0
261 views

How do you make log files of endpoints secure so you can audit and find the source of a cyberattack rapidly, and be sure that the information you are reviewing has not been compromised?

James Barry
10 months ago

2 answers

0

Continue to scan both internally, externally and all 'trusted' vendors dedicated connections for vulnerabilities and address them as identified.

Tim Smit
5 months ago
Thanks - James 5 months ago
0

Keep track of all the devices connected and of their logs, use SMB protocol, email filters, set up priviled accounts, two factors authentication, enable complex passwords

Paolo Beffagnotti
5 months ago

Have some input?