![]() ![]() This document lists our top 10 mitigating actions that your organization should take to protect its Internet-connected networks and sensitive information from cyber security threats. 2.7 Protect information at the enterprise Level.2.4 Harden operating systems and applications.2.3 Enforce the management of administrative privileges. ![]() 2.2 Patch operating systems and applications.2.1 Consolidate, monitor, and defend internet gateways.This document supersedes previous versions of ITSM.10.189 Top 10 IT Security Actions to Protect Internet-Connected Networks and Information and ITSB-89 v3 Top 10 IT Security Actions to Protect Government of Canada Internet-Connected Networks and Information. This version of the document includes considerations for consumers of cloud services and managed services. This publication takes effect on September 24, 2021. This document supersedes ITSM.10.189 Top 10 IT Security Actions to Protect Internet-Connected Networks and Information and ITSB-89 v3 Top 10 IT Security Actions to Protect Government of Canada Internet-Connected Networks and Information. ITSM.10.089 Top 10 IT Security Actions to Protect Internet-Connected Networks and Information is an unclassified publication issued under the authority of the Head of the Canadian Centre for Cyber Security. ![]() Alternate format: Top 10 IT security actions to protect Internet connected networks and information (ITSM.10.089) (PDF, 613 KB) ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |