Requirements 10.2, 10.3, also 10.5 upto 10.5.7 deal with logging of events and retention of those events for 365 days. Logging is necessary,
Larger companies consider cyber threat as a serious issue that could hinder their business. They follow and keep up with best practice rules. Smaller companies pay less attention to several important areas, and mid-size ones fall somewhere in between the two. Mid-size companies are inconsist ...
Read MoreThat basic a step is data encryption. It is one among many as we all know. If you start out with database encrytion, there are several ways to go about it. It could be encryption of an application or encr ...
Read MoreThis is one of the critical areas of 2012. An absolute must in the IT world is to control access privileges to areas of the network that are key to running a business. Such as data, applications, operating systems... Organizations may use a mix of solutions to minimize any kind of access risk. ...
Read MoreCyber thieves are busy staying ahead. Here are a few tricks that will keep them on their toes and you somewhat away from their bullets. Following these guidelines will make you a difficult target to reach.