Cyber Security Requires A Multi-Layered Approach.
AUTHENTICATION
Identify your individuals – create strong and unique usernames and passwords.
AUTHORISATION
Give only certain individuals, based on their identity, access the system.
ENCRYPTION
Convert data or information into code. This will prevent those unauthorised accessing your data.
AUDIT TRAIL
A chronological record providing evidence of activities that have affected a specific event, procedure or operation at any given time.