8/7/2019 McAfee - 15 minutes per day of Security
1/1
Monday Tuesday Wednesday Thursday Friday
Identify non-compliant systems
Keep non-compliant systemsupdated
Adjust zero-day threatprotection policies
Monitor compliance policies
Check for virusoutbreaks
Isolate and cleaninfected users
Monitor compliance policies
Detect rogue systems
Remediate rogue systems
Synchronize withActiveDirectory
Identify emerging threats
Detect rogue systems
Remediate rogue systems
Synchronize withActiveDirectory
Identify emerging threats
Detect rogue systems
Remediate rogue systems
Synchronize withActiveDirectory
Identify emerging threats
Manage quarantined emails
Tune mail servercontent filter
Confirm mail server spam andAV protection
Check for virus outbreaks
Assess Email and Web Gatewaydefense
Update Email and WebGateway defense
Monitor malicious web sites
Review content filtersat the gateway
Check for virus outbreaks
Isolate and c lean infected
users Assess Encryption Policy
compliance
Enforce disk encryption policy
Identify non-compliant systems
Keep non-compliant systems
updated Adjust zero-day threat
protection policies
Enforce file & folder encryptionpolicy
Assess Email and Web Gatewaydefense
Update Email and WebGateway defense
Monitor malicious web sites
Review content filtersat the gateway
Detect rogue systems
Remediate rogue systems
Synchronize withActiveDirectory
Check for virus outbreaks
Manage quarantined emails
Tune mail server content filter
Confirm mail server spamand AV protection
Identify non-compliant systems
Manage quarantined emails
Tune mail server content filter
Confirm mail server spam andAV protection
Check for virus outbreaks
Assess Email and Web Gatewaydefense
Update Email and WebGateway defense
Monitor malicious web sites
Review content filtersat the gateway
Identify non-compliant systems
Keep non-compliant systemsupdated
Adjust zero-day threatprotection policies
Monitor compliance policies
Check for virus outbreaks
Isolate and cleaninfected users
Monitor compliance policies
Identify non-compliant systems
Keep non-compliant systemsupdated
Adjust zero-day threatprotection policies
Lock lost or stolen devices
Check for virus outbreaks
Isolate and clean infected users
Assess networkconnected devices
Adjust device control policies
Manage quarantined emails
Tune mail server content filter
Confirm mail server spam andAV protection
Update network protection
Assess Email and Web Gatewaydefense
Update Email and WebGateway defense
Monitor malicious web sites
Review content filtersat the gateway
Assess Email and Web Gatewaydefense
Update Email and WebGateway defense
Monitor malicious web sites
Review content filtersat the gateway
Identify non-compliant systems
Keep non-compliant systemsupdated
Adjust zero-day threat
protection policies Check for virus outbreaks
Check for virus outbreaks
Isolate and cleaninfected users
Monitor perimeter
network protection Check compliance with PCI
W
E
E
K
1
W
EE
K
2
W
E
E
K
3
W
E
E
K
4
W
E
E
K
5
15 Minutes to a Secure Business
These are suggested best practices and do not guarantee 100 percent protection against security risks.
One hour a weekthat's how much time the typical small and medium business devotes to its information system security.Use this calendar to help track what activities to do on a daily basis that ensure your business is secured in just 15 minutes a day.
Smart
Simple Secu
re
Secu
rityS
olu
tion
sforSmallandMedium
Enterprises
E nd po in t D at a
Web
Network
Compl
iance
Top Related