What should be one of your key recommendations to the bank based on this information? Following a recent data breach, a regional bank engages your firm to undertake a security evaluation on their network. By compromising only one server, the attacker was able to obtain financial data from the bank.
A
Place a front-end web server in a demilitarized zone that only handles external web traffic
Comments