From Security Weekly WikiJump to navigationJump to search
##Unused accounts are regularly decommissioned or removed from the access control system.
##The IT estate as a whole is regularly backed up and there are easy-to-access policies, standards, procedures and work guides which are maintained and used.''
#[https://hbr.org/2019/12/to-build-a-strong-culture-create-rules-that-are-unique-to-your-company To Build a Strong Culture, Create Rules That Are Unique to Your Company]
#[https://www.itsecurityguru.org/2019/12/03/is-air-gapping-really-a-solution/ Is Air Gapping Really a Solution?]
#[https://www.computerweekly.com/opinion/Cyber-security-How-to-avoid-a-disastrous-PICNIC Cyber security: How to avoid a disastrous PICNIC]