References:
i 2019 Varonis Global Data Risk Report
ii Notifiable Data Breaches Statistics Report: 1 July to 30 Sept 2018
iii The Cost of Cybercrime to Australia
iv Forbes - 74% of Data Breaches Start with Priviledged Credential Abuse
v Australian Cyber Security Centre - Securing Powershell in the Enterprise
5. Align Your Technology with Best Practices
Select a common toolset or framework, such as the Cireson RS toolset, for administering an environment.
As the Australian Cyber Security Centre states, this will “...scale better than an ad-hoc configuration of dissimilar administrative tools.
This will reduce the complexity of network configurations (such as firewall rules) leading to a reduction in security risks associated with misconfigurations.”
v
About the Author
Brett Moffett
Solutions Architect, Cireson
With over 20 years of experience in a range of industries, Brett is all too aware of the many challenges with IT support and associated ITSM tools. Having held most support roles, Brett’s passion now lies in promoting the System Center platform. He has designed and implemented System Center and Cireson to customers in both Australia and globally. Joining the thought leaders in System Center Service Management and Asset Management, Brett is a frequent blogger and contributor to the Cireson Community and other online forums. He also hosts monthly Adelaide and Canberra Microsoft IT Pro Communities, as well as webcasts on technical or business process topics.