In our latest whitepaper, we discuss the five key controls, as advised by the National Cyber Security Centre:
- Configure and use a firewall
- Ensure only necessary software, accounts and apps are used
- Control access and admin privileges
- Implement anti-malware and whitelisting
- Patching