TEKST

B4Restore Storage and Backup News
June 2023

3 Typical Errors Found in IT Audits

IT audits helps your company keep focus on IT Risk Management and can reveal where you need to strengthen IT security and processes. Every company has its unique threat picture; however, these are the three most prominent errors found in IT Audits.

3 Typical Errors Found in IT Audits

  1. Policies are not adhered to


    Even when defined password policies are in place, there are always employees who don’t seem to be able to comply with them. The company must remember to follow up on these cases and not allow them to continue.

    There may also be system users who are exempt from following procedures. But are these cases documented? And is this always appropriate?
     

    ISO 27001 minimizes riskISO 27001 minimizes risk
    The ISO 27001 certifications is proof of maximum IT security and compliance, and the continuous improvement of internal IT processes is ideal for preventing ransomware-attacks. ISO 27001 covers people, processes and IT systems by applying a risk management process. Read more about ISO 27001

  2. Processes are system-controlled


    People – not systems – should control processes. In some companies, IT Risk Management merely involves reviewing a system’s flow. In such cases, there is a risk that users will leave fields empty or simply enter a “#”, which has no value.
     
  3. Users who have left the company are not deleted


    It may seem obvious, but it is important to close down the accounts of employees who have left the company. This is a typical error, resulting in inappropriate access.
     

    Whats next?
    With a Backup-as-a-Service solution you avoid the heavy costs associated obtaining critical mass; Obviously. You leave the backup operations to leading experts within the field, and your backup is separated from your live data for maximum ransomware protection. Read more about Separation of Duties 

> Read More: 7 Healthy Habits for IT Risk Management
> Read More: Next-level Awareness in IT Risk Management

 

Get in Touch

Jesper Juul, B4RestoreWant to learn more? We’re always ready for an informal conversation, contact CCO Jesper Juul at jju@b4restore.com.

 

Contact us