Types of flaws | Recommended solutions |
Authorization to use personal IT tools in the company network. | Set up mechanisms to restrict and control the use of these tools (GPO etc…) and encourage user awareness. |
Lack of intrusion detection mechanisms. | Deploy hardware or software solutions for detecting and preventing intrusions. |
Failure to change computer and digital equipment in general within a reasonable time.. | Avoid obsolete equipment by replacing it frequently (updating). |
The non-implementation of penetration testing periodically.. | Encourage, include in the security policy, and conduct periodic penetration tests to detect vulnerabilities in the company. |
Using non-genuine operating system. | Use licensed operating systems (in accordance with Microsoft). |
Use of outdated operating system. | Use operating systems whose technical support is still valid with Microsoft. |
Lack of recurrent training for IT professionals. | Set up in the security policy a continuous and periodic training plan. |