In all projects, we make sure that they are sufficiently secure. The main pillars include:
- UTM Firewalls with IPS, IDS and protocol control
- Multi-factor authentication for services accessed from the Internet
- Proper MS AD setup
- Limiting permissions to only what the user really needs
- Backup to a separate location
- Recovery plans (what if something doesn't work)
- Continuous monitoring of functionality