What steps should organizations take to protect against AETs?
First, they should audit critical infrastructure and critical assets. Second, they should identify the servers hosting those critical assets. And third, they should protect the assets based on their risk assessment. Organizations should plan to deploy centralized management, and seek solutions that are dynamic and flexible.