{"id":222,"date":"2011-10-15T23:30:00","date_gmt":"2011-10-15T23:30:00","guid":{"rendered":"https:\/\/belayclientstaging.zone\/securityeverafter\/2011\/10\/15\/find-your-sweet-spot\/"},"modified":"2011-10-15T23:30:00","modified_gmt":"2011-10-15T23:30:00","slug":"find-your-sweet-spot","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/find-your-sweet-spot\/","title":{"rendered":"Find Your Sweet Spot"},"content":{"rendered":"
<\/p>\n
Version 3 of the SANS 20 Security Controls includes integration by the leadership of the Australian Defense Signals Directorate. This includes 35 Mitigation Strategies that were developed and prioritized to prevent targeted computer attacks. Four of these are listed as mandatory and are known as the Sweet Spot. These are Patch Applications, Patch Operating Systems, Minimize the […]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[20,22,10],"tags":[],"jetpack_publicize_connections":[],"yoast_head":"\n