Summary
In this chapter, we took a closer look at how we can use different social media sources and RSS tools to collect relevant information related to IT security, and how we can use different services to monitor our infrastructure from an outside view.
This is probably the biggest challenge since new vulnerabilities are discovered and new attack vectors pop up every day, so it is important that all organizations try to stay ahead of the game and collect relevant information and understand the impact a vulnerability might have on their business before it is too late.
In the next and final chapter, we will go into more detail about the final best practices related to protecting Windows from ransomware attacks, with a bit more focus on the infrastructure side.