Threat and Vulnerability Management
- Does Tax Systems utilise functionalities for IDS/IPS?
- Do you have an in-house team that manages security testing, including, cybersecurity threats?
- Are alerts in place for common attack types (e.g., brute force authentication, DDOS, XSS, etc.)?
- Does Tax Systems use firewalls?
- Does Tax Systems use URL filtering?
- How does Tax Systems protect from malicious emails?
- Does Tax Systems protect laptops from malware?
- Does Tax System monitor vulnerabilities out of hours?
- Can customers view the results of independent tests?
- Are Tax Systems solutions independently tested?
- How often are security risk assessments done?
- Who does Tax Systems monitors for Information Security attacks?
- How does Tax Systems protect laptops from unauthorised use?
- How do you implement protection against Common Vulnerabilities and Exposure’s (CVEs)?
- How does Tax Systems protect laptops/endpoints?