Join a Panel

Finding source of attacks against critical infrastructure


How do you make log files of endpoints secure so you can audit and find the source of a cyberattack rapidly, and be sure that the information you are reviewing has not been compromised?

Blockchain Technology
Cybersecurity Strategy
Endpoint Security
James Barry
7 months ago

2 answers


Continue to scan both internally, externally and all 'trusted' vendors dedicated connections for vulnerabilities and address them as identified.

Tim Smit
26 days ago
Thanks - James 26 days ago

Keep track of all the devices connected and of their logs, use SMB protocol, email filters, set up priviled accounts, two factors authentication, enable complex passwords

Paolo Beffagnotti
25 days ago

Have some input?