- Segment network: Segment your IOT devices to a separate guest network. Check Internet connected devices, Lights? Camera? Door Security?
- Check your cloud instances for Vulnerability, unauthenticated/unauthorized usage Bitcoin mining, etc
- Work Laptop: Do not use your work laptop for anything else. If company allows BYOD its good to tie it to policies
- Zero trust: where possible layout Zero Trust policies. For sure use MFA: Multi-Factor Authentication
- Secure Endpoints
- Honeypot strategy
- Developers code : Check code for vulnerabilities and following security framework
Password Strategy
Leave a Reply
Want to join the discussion?Feel free to contribute!