The top nine cybersecurity best practices for industrial environments - Want to print this list out and share with your team? Download the printable checklist here:
Domain Controllers: Minimum of two
VMWare Hosts: Minimum of two
Firewalls: Recommend HA where needed
Switches: redundant topology or cold spares
No Shared/Generic Accounts
Managed: Process for Removal
Active Directory (Utilized where applicable)
No Default
Basic Complexity
2FA or MFA when available
Manual/Automated
Tracked and Maintained
Manual/Automated
Tracked and Maintained
Expiration Dates
Document Contacts
Clear plan for escalation
UPS - Short-term
Generator - Long-term
Local
Replicated Offsite or Secondary Site
Cold Backup to NAS
Want a printable version of this cyber best pratice checklist?
Download it now and share with your team.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |