header bg


What should be one of your key recommendations to the bank based on this information?
Following a recent data breach, a regional bank engages your firm to undertake a security evaluation on their network. By compromising only one server, the attacker was able to obtain financial data from the bank.

A Place a front-end web server in a demilitarized zone that only handles external web traffic