Develop a timeline and delegate duties (compliance automation software will make this activity a lot less time intensive) Establish firewalls and router specifications, which established procedures for allowing for and denying access to your units. Firewall configurations should be reviewed bi-annually to make certain there won't be any faulty entry https://www.nathanlabsadvisory.com/blog/nathan/cyber-security-consulting-solutions-by-nathan-labs-advisory-in-the-usa/