Skip to main content

Cyber Security Day #6 Secure Configuration

By 17th November 2015Italik News

secure-configuration

Are all endpoints, servers and networks securely configured?

By putting in place corporate policies and processes to develop secure baseline builds and manage the configuration and the ongoing functionality of all Information and Communications Technologies (ICT), organisations can greatly improve the security of their ICT systems. Good corporate practice is to develop a strategy to remove or disable unnecessary functionality from ICT systems and keep them patched against known vulnerabilities. Failure to do so is likely to result in increased exposure of the business and its ICT to threats and vulnerabilities and therefore increased risk to the confidentiality, integrity and availability of systems and information.

Using industry standard tools Italik can carry out:

  • Infrastructure audits
  • Infrastructure hardening
  • Penetration tests
  • Maintain patch levels on all systems
  • Control and manage audit logs
  • Monitor network activity

Leave a Reply