Pageviews and counting

Sunday, October 27, 2024

Data Center Security Top 10

  1. Are file comparison checks conducted on critical systems at least once daily?
  2. Are users permitted to set a new password that matches a previous one?
  3. Are intrusion detection systems and firewalls implemented on the hosted systems?
  4. Are all critical systems equipped with password-protected screen savers or terminal locks?
  5. Are the goals and objectives adaptable to allow for necessary modifications?
  6. Do visitors need to sign out and return their badge or tag before exiting the building?
  7. How can you modify a current policy applied to virtual security system instances?
  8. Which companies provide application and operating system vulnerability scanning services for you?
  9. What is your primary role within your organization—are you an employee or a contractor?
  10. What measures are in place to ensure regular training on security protocols for employees?


No comments:

Post a Comment