Skip to the content.

Security Checklist.

These are some suspicious activities which can point to a cyber attack or starting of one.

Accounts:

For individuals.

Operating systems:

For computers with simple usage.

Webservers:

For devices hosting webapps.

Intranet devices:

Devices located in independent subnets. (Databases, backups, storage, etc.)

← Back