Summary
In summary, encrypting your data in transit and while stored is critical in building your security program. In order to ensure that data is encrypted, it should be part of your security baseline. For example, all laptops and servers should be configured to ensure the hard drives are encrypted. Also, disable protocols such as Telnet. Understanding where PII is stored and processed within your network is important to protecting it. Finally, vetting your critical third-party vendors is important to lowering your company’s risk.
In the next chapter, we will be covering security resilience: taking your security program to the next level. We will discuss more advanced security measures that you can take to level up your security program.