
PROTECT YOUR BUSINESS FROM #CYBER ATTACKS:
Protect security logs and preserve them. Reliable, preserved logs are essential to detect and respond to a cyber attack. Cyber criminals often attempt to erase them. Take these action steps today to help stay cyber-safe:
Start now:
•Centralize authentication, email, endpoint, network, DNS, and cloud audit logs; export daily to protected, immutable storage.
•Retain logs based on legal and response needs (12 months is a common baseline).
•Synchronize system clocks and validate retention.
•Quarterly, generate a full incident timeline for a selected user and server to identify gaps.
Learn more from #FBI here: ow.ly/2bbN50Yw4ya

English





















