To what extent are these files insulated from external – and internal – unauthorized access?
As good security rules state, the County employs a multi-tier approach to security: • the servers hosting this application are behind industry-standard firewalls • the County utilizes intrusion detection, intrusion prevention, and log correlation products which assist us in identifying unauthorized access • security audits and system lockdown/patching occur on a regular basis