Towerwall's InfoSec Blog

Content Type

See all

Create a data recovery plan and secure your network

routers , data recovery capability , cyberattacks , disaster recovery , data recovery plan , boundary defense , firewalls , switches , secure configurations

Michelle Drolet

Following the Center for Internet Security’s best practices. We discussed building malware defenses the last time out, but today we’re going to focus on Critical Security Controls 10, 11, and 12 covering data recovery, secure network configuration, and boundary defense. It’s unrealistic to think that you can completely avoid cyberattacks and data breaches, so it’s vital to have a proper data recovery plan in place. You can also tighten your defenses significantly by ensuring all of your networkfalse