Back To: Boost IT Security In 30 Days

Step 1: Implement Proper Scanning and Check Logs

Scott told agencies that they must immediately deploy indicators provided by the Department of Homeland Security (DHS). Those “indicators” involved threat actor Techniques, Tactics, and Procedures to scan systems and check logs. Agencies, in turn, immediately alerted DHS if indicators return evidence of malicious cyber activity.