PROTECT

PROTECT

Protect – helps to protect business using appropriate safeguards to ensure delivery of critical infrastructure services. Protect function supports the capacity to limit or contain the effect of a potential cybersecurity event.

Protect categories include:

‣ Identity Management, Authentication and Access Control – includes secure access protections for authorized users while disables access, view or change organization’s systems, data and assets to unauthorized users.

‣ Awareness and Training  – provided education of cybersecurity to the organization’s personnel and partners, and trained to understand their roles and responsibilities within the organization.

‣ Data Security – consistently managing data with the organization’s risk strategy, and supporting the confidentiality and integrity of information while also ensuring its availability.

‣ Information Protection Processes and Procedures  – includes maintaining and managing security policies, processes and procedures to protect information systems and assets.

‣ Maintenance  – controlling and monitoring over remote maintenance to protect organizational resources.

‣ Protective Technology – technical security solutions are managed to ensure access to systems and assets, protection of communications and control networks, implementation and review of audit and log records, and to control removable media usage, consistent with related policies, procedures, and agreements.

Our opinion and advice are free