
Table of Contents
- 1) Edge Monitoring
- 2) Email Filtering
- 3) Encrypt Sensitive Data
- 4) Embrace an Aggressive Patching Schedule
- 5) Egress Awareness
- 6) Exfiltration Insight
- 7) Endpoint Protection
- 8) Exercise Caution in Password Re-use
- 9) Enforce Multi-Factor Authentication
- 10) External Penetration Testing
- 11) Enhance Access Control and Permissions
- 12) Eliminate Shared Accounts
- 13) Expunge Admin Rights from Accounts
- 14) Examine and Update Response Plan
- 15) Elevate the Bar for Remote Connectivity
- 16) Establish a Proper Logging Solution and Retention Timeframe
- 17) Extend Security Policy to Remote Devices
- 18) Employ a Centrally-Managed, Cloud-Hosted Password Manager
- 19) Extract Backups from Network
- 20) Educate Users
- 21) Experiment on Users
- 22) Eschew Unnecessary Alerting
- 23) Erase Unneeded Data
- 24) Engage Partners When You Need to Augment Team Skills
- 25) Equip Yourself with Information