1. Maintain working firewalls.2. Keep security patches up to date.3. Use and update antivirus technology.4. Maintain a comprehensive, written security policy. 5. Adhere to a secure application-development methodology and build security into all applications.6. Utilize access-control and authorization tools appropriate for the type of information to be accessed, stored or transmitted. 7. Encrypt any sensitive information transmitted over the Internet.8. Maintain active threat-monitoring and response procedures.9. Require notification of any security incidents.10. Require security verification through third-party audit or penetration testing.11. Segment the network architecture.12. Conduct background checks for all employees who may access your company’s sensitive information. 13. Require contractual indemnification for damage and liability caused by a partner’s security failure. Related content brandpost Sponsored by Freshworks When your AI chatbots mess up AI ‘hallucinations’ present significant business risks, but new types of guardrails can keep them from doing serious damage By Paul Gillin Dec 08, 2023 4 mins Generative AI brandpost Sponsored by Dell New research: How IT leaders drive business benefits by accelerating device refresh strategies Security leaders have particular concerns that older devices are more vulnerable to increasingly sophisticated cyber attacks. By Laura McEwan Dec 08, 2023 3 mins Infrastructure Management case study Toyota transforms IT service desk with gen AI To help promote insourcing and quality control, Toyota Motor North America is leveraging generative AI for HR and IT service desk requests. By Thor Olavsrud Dec 08, 2023 7 mins Employee Experience Generative AI ICT Partners feature CSM certification: Costs, requirements, and all you need to know The Certified ScrumMaster (CSM) certification sets the standard for establishing Scrum theory, developing practical applications and rules, and leading teams and stakeholders through the development process. By Moira Alexander Dec 08, 2023 8 mins Certifications IT Skills Project Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe