Threat and Vulnerability Management
- Does Tax Systems use firewalls?
- Does Tax Systems use URL filtering?
- How does Tax Systems protect from malicious emails?
- Does Tax Systems protect laptops from malware?
- Does Tax System monitor vulnerabilities out of hours?
- Can customers view the results of independent tests?
- Are Tax Systems solutions independently tested?
- How often are security risk assessments done?
- Who does Tax Systems monitors for Information Security attacks?
- How does Tax Systems protect laptops from unauthorised use?
- How do you implement protection against Common Vulnerabilities and Exposure’s (CVEs)?
- How does Tax Systems protect laptops/endpoints?