How would you know if your network has been neglected by your MSP (Managed Service Provider) or (You're own IT Department)? Call Virtual IT Security's SWAT Team
Neglecting to address network security abuse can cause widespread problems for both the service provider and its clients, which is why it’s imperative to remediate or mitigate the threat once it has been collated, parsed, and handled. This is the final phase in the network abuse handling process.
Remediation / Mitigation
Remediation occurs when the threat can be eradicated, while mitigation involves minimizing the damage as it cannot be fully eliminated. For example, Distributed Denial of Service (DDOS) mitigation routes suspicious traffic to a centralized location where it is filtered. Note that mitigation is generally less preferable as risks that cannot be fully eliminated are more costly to control. For instance, fixing a network security issue is better than blocking the port that could expose it.
Projects vary, and may involve the following: