Protecting Availability

First, I would implement a firewall so that all traffic is monitored and filtered before coming through. Secondly, I’d encrypt all data so that its at least harder to get a hold of, which will prevent and or limit information from falling into the wrong hands. On top of the firewall and data encryption, I would also implement an anti-virus software, this would help block out malware, like pop-ups, and help identify untrustworthy sites that may pull information or put viruses on the device. I would also hire or seek an experienced cybersecurity threat analyst and penetration/vulnerability testers to add extra help aside the firewall and anti-virus. They’d help supervise the systems to make sure there is no unusual traffic and also test the systems to make sure there are no weak points or weak points an attacker could target. Finally, I’d run regular system checks and tests to make sure that everything is going as its supposed to.

Leave a Reply