Firewalls shall be installed and operated at the network boundaries, including endpoint firewalls.
Firewalls shall be installed and operated at the network boundaries, including endpoint firewalls.
Anti-virus, -spyware, and other -malware programs shall be installed and updated.
Anti-virus, -spyware, and other -malware programs shall be installed and updated.
The organisation shall monitor and identify unauthorised use of its business-critical systems through the detection of unauthorised local connections, network connections and remote connections.
The organisation shall monitor and identify unauthorised use of its business-critical systems through the detection of unauthorised local connections, network connections and remote connections.
The organisation shall continuously monitor its network to spot signs of cyber threats or unusual activity, using clearly defined rules for what counts as a potential security incident.
The organisation shall continuously monitor its network to spot signs of cyber threats or unusual activity, using clearly defined rules for what counts as a potential security incident.