Draft Blog Article to Duplicate
Duplicate this article and then edit it to create easy to complete Blog articles.
Title of article
Paragraph stating the thesis of the article and supporting points.
What Should You Do?
From the perspective of an SMB – what should you do is explained.
Other answers to the problem
You have a vCISO advising you/Vulnerability Alert Management Process (VAMP)/Security CyberIncident Management process (CIMP), right?
If you’re a subscriber to CyberHoot’s services, you’ll have access to our Policy and Process library which contains the vulnerability alert management process document. This document prescribes how to respond to situations like this and in what time frame. If your company has not yet adopted a VAMP-like process, now is a great time to get started.
links to source material