Use at least three synchronized time sources from which all servers and network devices retrieve time information on a regular basis so that timestamps in logs are consistent
Maintain documented, standard security configuration standards for all authorized operating systems and software.
Use automated tools to inventory all administrative accounts, including domain and local accounts, to ensure that only authorized individuals have elevated privileges
Enterprises can defend proactively against cyber attackers by changing the mindset from ‘if’ an attack will happen to ‘when’ an attack will happen. Teams must be actively investigating the environment for IOCs by continuing to collect data from multiple sources and looking for known malware via signatures and unknown malware via behavioral detection algorithms.
We believe in Technology as a Force for Good and invest heavily in our community with a focus on training, workforce development, and STEM education.