Assignment 1 (1) CS
Assignment 1 (1) CS
Assignment 1 (1) CS
ASSIGNMENT -1
• Application security
• Information security
• Disaster Recovery Planning
• Network Security
• End-user Security
• Operational Security
Misconfiguration of security settings is a major reason for cloud account data breaches.
Companies will use a major cloud service, such as Microsoft 365, but won’t understand
that they need to customize their security settings from defaults.
Most companies will need to adhere to one or more information security standards.
These standards can have stiff penalties should negligence result in the compromise of
personally identifiable information.
Cyber security companies will look at how you collect, store, and transmit data. They’ll
put protections in place to ensure that data is encrypted as needed, and protected from
being breached.
3.) DISASTER RECOVERY PLANNING:- Many companies seek out the help of
cyber security consulting services when it comes to disaster recovery planning.
This is key to keeping your business from being among the 60% that fold after
falling victim to a cyberattack.
Securing your wireless network and ensuring any remote connections happen through
encrypted methods are also ways that cyber security services ensure network security.
Some of the most common types of end-user protection that you should have include:
When providing operational security consultations, MSPs will try to think like an
attacker. They’ll probe all the different areas of your technology environment to see
where a potential breach could occur.
Operational security is the umbrella that encompasses all of your IT security processes. It
guarantees that the operation as a whole is not only securing all areas of a potential
breach, but also regularly updating its security strategies to keep up with the latest
threats and security advances.
[CO2]