Cybersecurity begins with knowing what assets are owned and managed by an organization. Information technology assets can take many forms — from traditional computer workstations to servers, where each asset has a name and an IP address.
Many cybersecurity-related risks can be traced back to poor asset management.
Asset management is complex. An organization’s asset management system should include all devices: traditional workstations and servers, networking devices, cloud-based systems, cloud-based applications, vendor-managed systems, employees’ personal devices used for work purposes, and physical security devices such as badge readers and cameras.