|
Post by juthi52943 on Jan 5, 2024 23:21:03 GMT -5
As with ransomware attacks, regardless of the outcome and consequences of the attack, reassessing IT security is mandatory for administrators in similar cases. Sample list of recommended measures using state-of-the-art encryption and key management, especially when processing passwords, sensitive or financial data, regular software update, using strong authentication methods. Such as two-factor authentication or authentication Job Function Email List servers, use of appropriate, up-to-date, effective and integrated firewalls, intrusion detection systems and other protection systems, systematic IT security audits and vulnerability assessments penetration tests, regular reviews and tests to ensure that backups can be used to restore data whose integrity or availability has been compromised. Human error The EDPB emphasizes the role of human error in personal data breaches due to its commonness. Since these types of breaches can be both intentional and unintentional, it is very difficult for data controllers to identify vulnerabilities and take measures to avoid them. Example In the eighth example, the EDPB takes us to a company where an employee on notice copies business data from a database.
|
|