Issue link: https://resources.genetec.com/i/1480711
Cybersecurity checklist Maintenance and updates □ Do I have tools to keep my devices and physical security software up to date? □ Am I on the lookout for critical security updates for my on-premises systems? □ Have I verified the source and legitimacy of each software and firmware update before installation? □ Have I checked device inventory against published information about manufacturers and models that have identified security risks? □ Do I have a plan to improve the network design as needed to segment older devices and reduce potential crossover attacks? □ Am I applying the proper software patches and hotfixes? □ Am I properly maintaining my Windows ecosystem? □ Do I have the proper tools to keep everything up to date and cyber secure? □ How can I keep my list of users up to date? □ Do I have tools to automate my maintenance activities? □ How do I keep the operating system of my security appliances up to date? □ Do I have tools to review which users have access to our systems, applications, and data and update user privileges? Health monitoring and risk management □ Do I have the proper tools to monitor the status of my systems and devices? □ Can I centrally monitor the status and health of multiple deployments? □ Is automated alerting set up for critical events and thresholds? □ Am I keeping a chain of custody? □ Am I conducting reviews of audit trail logs or automating reports on user actions, system events, and access attempts? □ Am I on the lookout for new threats and vulnerabilities? □ Do I have log analysis techniques to investigate in case of a cyber incident? Monitor the health of your Genetec system with confidence The Genetec Professional Services team can help you check your cybersecurity posture and share preventative measures to keep your system running efficiently. Find out how our security experts can help Once your deployment is complete, the job doesn't end there. This checklist will help you monitor the health of your system, check your cybersecurity posture, and plan preventative measures to keep your system running smoothly. Post deployment