Compliance and Safety → Cybersecurity

Threat Surveillance (24/7 Monitoring) (CS020)


Description
The modern office is becoming increasingly cloud-based and digitalized. This has some obvious benefits, such as cost and space savings. But it does open up some other issues, particularly when it comes to cyber threats. Criminals are evolving the ways in which they can take advantage of new vulnerabilities in systems. So, to be secure, you’ve got to be proactive.

Preventative security tech, such as firewalls and antivirus software are useful tools that certainly help to protect against obvious threats. But what about more sophisticated threats that can evade these controls? Threat surveillance must be in place 24/7 to help comply with regulatory requirements, detect a broader range of threats, and reduce threat response time. This course can help you get started.

By the end of this course, you’ll be able to:

• Identify potential threats to be monitored
• Adopt ways to best protect your systems
• Recognize the most vulnerable networks for 24/7 monitoring

Why take this course?

If you are an IT, operations, or security manager, or even a business leader, then it’s crucial to continuously monitor cybersecurity threats. Being part of a larger cybersecurity plan, monitoring and threat surveillance can help your organization stop attacks in their infancy before they get the chance to cause damage and disruption.

10 mins | SCORM | Takeaway Tasks

Content
  • Threat Surveillance (24/7 Monitoring)
Completion rules
  • All units must be completed