What do you consider the top 3 most important steps to take when it comes to keeping secure your digital data and devices?
IT Manager in Software, 5,001 - 10,000 employees
Strong governance on:Priviledges
Password
Relevant training
IT Manager in Construction, 501 - 1,000 employees
GRCGovernance
Risk
Compliance which Covers CIA (Confidentiality, Integrity and Availability)
Network and Security Architect team lead in Finance (non-banking), 10,001+ employees
Data GovernanceClassification and labeling
Secure data based on classification - segmentation, authentication and encryption.
IT Manager in Education, 501 - 1,000 employees
1- Employee training to avoid insider "accidental" mishaps and leaks;2- ZTNA
3- Invest in a good firewall solution that enforces automatic intrusion detection.
IT Manager in Transportation, 1,001 - 5,000 employees
End user infosec training will play vital role.End point security.
Permitter security.
IT Manager in IT Services, 10,001+ employees
Digitization and automation should go hand in hand and be adjusted to requirements of security compliance Keep your system updated with malware response checks and systems to prevent any threat and Hacking attempt
Content you might like
Company financial stability56%
Industry trends46%
Length of time in business44%
Recent layoffs or restructuring44%
Employee turnover rate38%
Compensation34%
Culture37%
Blindly following Review sites (eg. GlassDoor)5%
Other(s)2%
361 PARTICIPANTS
Training and Assessment Operations in Education, 501 - 1,000 employees
Switching to hardware keys for MFA can be challenging sometimes as authentication layers can sometimes be slightly incompatible to the device or applications and pose authentication issueCyber attacks & Data breaches49%
Supply chain disruptions36%
Regulatory non-compliance35%
Financial risks33%
Reputation risks31%
All of the above22%
None of the above0%
369 PARTICIPANTS
IT Manager in Transportation, 10,001+ employees
Always remember about Risk Assessment. Conduct a thorough risk assessment to identify potential data loss risks and vulnerabilities. Use this assessment to prioritize DLP efforts.
EDR
Limited access