As reported on Processor, knowing how secure your network is starts with assessing current security measures throughout the enterprise and identifying any security holes. Author Jean Thilmany offers advice on avoiding data breaches in this article.
“’One common mistake is that temporary access provided for a particular reason isn’t revoked, Sachdev says. ‘For example, a lot of administrators disable certain firewall rules as a troubleshooting step, but [they] forget to enable those rules again leaving open access to vulnerable targets,’ he says.”