LOOKING FORWARD ▪ Engage in periodic pen testing and IR tabletop exercises ▪ Consider a threat hunt to identify all existing compromises ▪ Regularly update network map ▪ Periodically assess and adjust email rules and configurations ▪ Provide periodic cybersecurity training for all employees ▪ Create a culture of security
15
Made with FlippingBook - Online catalogs