FTFBTF - For the Founder By the Founder - Privacy Security Unboxed for the SMB business

Step 5 – Review of implementations - controls can be implemented using open source software


Listen Later

We have rolled out policies, procedures etc. However, it cannot be standalone and cannot be only a one-time review.

Review of implementations like Log Review, Incident Review, SIEM, Monitoring of the various access, set up a helpdesk etc. All of these can be implemented via Open Source solutions.

 

We have now defined policies, procedures, done the technical implementation using all the technologies we had within our setup. This is to ensure that we have generated optimum usage of everything we have spent on. Like learning, investment in technology is not wasted. We will always find use of this in every mode that is possible. Each desktop can be used, each laptop can be used in the defense of cybersecurity. It is not just the biggies like Firewall etc that come to the rescue. Many of the attacks happen through legitimate traffic (e-mail, while browsing) etc and hence the end point (as we call the desktop etc in security parlance) needs to have a defense mechanism as much as the others.

The flow described in this season can be used by in either of the below situations:

  • you and work standalone/ 
  • work with a consultant/expert 
  • can be used to run the show via the Arrka Privacy Management Platform (both for Security and Privacy). 

For details, reach out to us on [email protected]; [email protected]; twitter: sameeranja, twitter: arrka2; Give a reference of this cast and avail credits on the platform usage and subscription. The Arrka Platform is made by SMB and for the SMB.





...more
View all episodesView all episodes
Download on the App Store

FTFBTF - For the Founder By the Founder - Privacy Security Unboxed for the SMB businessBy Sameer Anja