Netwrix, a firm that focuses on change and configuration auditing, has published a list of steps that are said to be the key in preventing a data breach. Security isn’t as simple checklist and if there was a magical list of three things, I’m sure this list would have been sold many times over long before now. The list is flawed, but each of the three items have valid uses for IT operations and IT operations, they’re not perfect, they say. The OPM breach was the most recent example of a breach where assets and changes to them were monitored on some level.”]