Most of the companies are providing remote access through a VPN tunnel to 3rd party providers in order to support some of the systems.
Usually this type of connections is unantented without monitoring the actions performed by the provider.
Can you ensure that your 3rd party provide does not:
a) create a copy of your database and transfer it to his machine?
b) Does not perform any reconnaissance actions to detect more information about your network?
c) Does not attempt to test what can find of access it can get?
Join us on Wednesday 17/02/2021 @ 12:00 and find out how you can monitor and control the access of external providers to your critical IT systems.