“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” Sun Tzu.
Sun Tzu’s words still resonate today. Organizations who know their adversaries, while being aware of their own strengths and vulnerabilities, stand a better chance in the ongoing cyber security war. Don’t wait until after your organization has been attacked to bolster your security posture. Go on the offensive against attackers.
What are some measures to ensure your organization is cyber resilient and ready for battle? We created the following tactical cyber security checklist based on best practices from the 2016 Internet Security Threat Report (ISTR), our annual report which provides an overview and analysis of the year in global threat acitivity.
While you check off these best practices, be sure to also test, test, and test. Are your security solutions updated regularly? Do you know how your team will respond in the event of a data breach? It’s important to constantly test not only your security technology but also the teams that manage the solutions to stay ahead of threats.
It has not changed.
Hello, thanks for the recommendations, but the last time we checked, Symantec Endpoint Protection doesn't have an option for scanning removable media upon insertion to the PC/server. Can you please advise if things have changed?
Thanks,
Terry
Very solid checklist, which covers everything from a high level perspective.
As per above checklist every organzation has be to checked all boxes for adequte security in the company environment.
tactical cyber security checklist based on best practices from the 2016 Internet Security Threat Report (ISTR)
Ensure this to be done on priority
in ny organsation all boxes not checked. nned to review the same
Agree with Symantec and need to follow every organsation for better security
Accepted....much have checked all boxes
i am aggred with symantec need to be checked all above boxes
Thats great, need to check all boxes to ensure the security
All boxes need to be checked for security
Ensure all boxes are checked.....else ready for mishap
Need to check if we have all boxes checked. Must be checked. Good article
Truly agreed. Must have those above checklist complied.
I agree with above points
Hi All -- Thank you for the feedback!
We just published a blog post "Data Breach Checklist," which provides insights on how organizations (and individuals) can protect themselves before, during and after an attack.
Please read the full post and see the "Data Breach Checklist" here: http://www.symantec.com/connect/blogs/data-breach-checklist
Thanks for sharing your security checklist.
All boxes checked!
Useful checklist, most important for me is backups for when things go wrong!
It's a great security checklist to follow. From my point of views, important things are restrict email attachment, do backup more frequently and use strongest passwords as possible.
You really do need to think like a potential enemy in roder to protect yourself. The items in the checklist should be SOP for any business.
A good checklist - it put you a step ahead from these so-called 'attackers'.
This is a great checklist and details on the specifics of it.
Its sounds good checklist
Excellent list of things to be aware of!
Sounds like a great checklist to adhere too.
All boxes checked! We're good! :)