{"id":18,"date":"2022-04-12T00:52:01","date_gmt":"2022-04-12T00:52:01","guid":{"rendered":"http:\/\/tcm.gov.to\/?page_id=18"},"modified":"2022-04-29T01:15:00","modified_gmt":"2022-04-29T01:15:00","slug":"monitoring-threats","status":"publish","type":"page","link":"https:\/\/tcm.gov.to\/?page_id=18","title":{"rendered":"Monitoring Threats"},"content":{"rendered":"<div id=\"themify_builder_content-18\" data-postid=\"18\" class=\"themify_builder_content themify_builder_content-18 themify_builder\">\n    \t<!-- module_row -->\n\t<div   class=\"themify_builder_row module_row clearfix module_row_0 themify_builder_18_row module_row_18-0 tb_uk5z137\">\n\t    \t    <div class=\"row_inner col_align_top\" >\n\t\t\t<div  class=\"module_column tb-column col-full first tb_18_column module_column_0 module_column_18-0-0 tb_gyj4138\" >\n\t    \t    \t        <div class=\"tb-column-inner\">\n\t\t    <!-- module text -->\n<div  class=\"module module-text tb_fkhx138    \">\n            <div  class=\"tb_text_wrap\">\n    <h1 style=\"text-align: center;\"><a name=\"_Toc99630226\"><\/a>Monitoring\u00a0<\/h1>    <\/div>\n<\/div>\n<!-- \/module text -->\n<!-- module text -->\n<div  class=\"module module-text tb_qozv138    \">\n            <div  class=\"tb_text_wrap\">\n    <p>It is important that all considerable changes in technological risks are included in the risk mapping. New risks related to major shifts in technology such as the use of artificial intelligence, quantum computing, etc. should also be considered. Similarly, risks that are related to the growing use of existing technologies such as cloud computing and IoT should also be considered in the risk landscape.<\/p>\n<p>Monitoring cyberthreats provides critical information on changing conditions that could potentially affect the ability of organizations to conduct core missions and business functions. Information derived from the ongoing monitoring of risk factors can be used to refresh risk assessments at whatever frequency deemed appropriate.<\/p>\n<p>Monitoring of cyber threats is a continuously ongoing activity. The responsibility of cyber threat monitoring should be assigned to appropriate employees. For monitoring, there are numerous sources to obtain information of the latest cyber threats &#8211; mailing lists, CERT Tonga regular notifications\/advisories, other CERTs\u2019 advisories, vendor notifications\/advisories and security news feeds. Once relevant new cyber threats have been identified, the applicability of advisories in the organization should be assessed and timely corrective actions should be planned and executed.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->\n\t        <\/div>\n\t    \t<\/div>\n\t\t    <\/div>\n\t    <!-- \/row_inner -->\n\t<\/div>\n\t<!-- \/module_row -->\n\t<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Monitoring\u00a0 It is important that all considerable changes in technological risks are included in the risk mapping. New risks related to major shifts in technology such as the use of artificial intelligence, quantum computing, etc. should also be considered. Similarly, risks that are related to the growing use of existing technologies such as cloud computing [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-18","page","type-page","status-publish","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"builder_content":"<h1 style=\"text-align: center;\"><a name=\"_Toc99630226\"><\/a>Monitoring\u00a0<\/h1>\n<p>It is important that all considerable changes in technological risks are included in the risk mapping. New risks related to major shifts in technology such as the use of artificial intelligence, quantum computing, etc. should also be considered. Similarly, risks that are related to the growing use of existing technologies such as cloud computing and IoT should also be considered in the risk landscape.<\/p> <p>Monitoring cyberthreats provides critical information on changing conditions that could potentially affect the ability of organizations to conduct core missions and business functions. Information derived from the ongoing monitoring of risk factors can be used to refresh risk assessments at whatever frequency deemed appropriate.<\/p> <p>Monitoring of cyber threats is a continuously ongoing activity. The responsibility of cyber threat monitoring should be assigned to appropriate employees. For monitoring, there are numerous sources to obtain information of the latest cyber threats - mailing lists, CERT Tonga regular notifications\/advisories, other CERTs\u2019 advisories, vendor notifications\/advisories and security news feeds. Once relevant new cyber threats have been identified, the applicability of advisories in the organization should be assessed and timely corrective actions should be planned and executed.<\/p>","_links":{"self":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages\/18","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=18"}],"version-history":[{"count":11,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages\/18\/revisions"}],"predecessor-version":[{"id":249,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages\/18\/revisions\/249"}],"wp:attachment":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=18"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}