Cyber Security - Summary
Clear policies w/ compliance & enforcement
Good, appropriate authentication controls
Well configured and maintained systems
Regular backup of all critical data
Disaster recovery plan
Your active involvement
Previous slide
Next slide
Back to first slide
View graphic version