Theme Description | Frequency | % | |
Detection mechanism | Positive | 10 | 71% |
Investing in the newest technology tools | 14 | 100% | |
Use of intrusion detection tools | 7 | 50% | |
Pen testing systems on regular basis | 11 | 78% | |
Proactive monitoring to detect unauthorized activities | 9 | 64% | |
Use of external auditors | |||
Negative | |||
Systems developed and validated by the same team member | 1 | 1% | |
Job rotation not practised | 1 | 1% |