Restrict file and Listing permissions on the web server to forestall unauthorized access to configuration information.
Revoke unwanted privileges and roles from inactive or terminated accounts to reduce the assault https://digitalhutline.com/cybersecurity/10-essential-cybersecurity-tips-for-small-business/