Number of reported incidents
Number of systems with known vulnerabilities
The ultimate reference guide to cybersecurity threats
Time from detection to containment to eradication
Number of days to deactivate former employee credentials
Number of users with "super user" access level
Frequency of review of third-party access
Bolstering Defence with Singtel's Next-Gen Advanced SOC
You may also like