Posted by:
admin
16 years, 8 months ago
This article at CIO Magazines lists 5 ways to improve your defences, including:
3) Seize control. At network connection points, implement filters to allow use of only those ports and protocols with a documented business need. Use two-factor authentication and encrypted sessions on all network devices. Require people logging in remotely to use two-factor authentication, too.
Share on Twitter Share on Facebook
