November 22, 2021
Train staff regularly on industry-standard protocols for data security
Encrypt sensitive data at rest and in transit
Implement role-based security solutions, limits on length of data access, access to sensitive data and administrative privileges
Implement two-factor authenticator process
Apply patches as part of comprehensive plan for system testing
Security test and configure all software/hardware before adding them to the network
Map network and its connections to show the dependencies between applications, data and network layers to highlight potential vulnerabilities
Make computing resources physically unavailable to unauthorized users