Theme Description

Frequency

%

Detection mechanism

Positive

10

71%

Investing in the newest technology tools

14

100%

Use of intrusion detection tools

7

50%

Pen testing systems on regular basis

11

78%

Proactive monitoring to detect unauthorized activities

9

64%

Use of external auditors

Negative

Systems developed and validated by the same team member

1

1%

Job rotation not practised

1

1%