Immediately following a Risk Assessment or a cyber-attack, the process of Risk Remediation begins. It is important that a system’s vulnerabilities be mended as quickly as possible to ensure the continued safe use and storage of confidential data. Remediation efforts not only includes patching systems and using the most secure settings, but also creating policies and procedures and employee training. To help with managing intrusion once Risk Remediation is complete, vulnerability management systems can be deployed.