<?xml version="1.0" encoding="UTF-8"?><oembed><type>video</type><version>1.0</version><html>&lt;iframe src=&quot;https://www.loom.com/embed/ae94675e2fd54d439929f050d2cd079c&quot; frameborder=&quot;0&quot; width=&quot;1280&quot; height=&quot;960&quot; webkitallowfullscreen mozallowfullscreen allowfullscreen&gt;&lt;/iframe&gt;</html><height>960</height><width>1280</width><provider_name>Loom</provider_name><provider_url>https://www.loom.com</provider_url><thumbnail_height>960</thumbnail_height><thumbnail_width>1280</thumbnail_width><thumbnail_url>https://cdn.loom.com/sessions/thumbnails/ae94675e2fd54d439929f050d2cd079c-00001.gif</thumbnail_url><duration>262.79499999999996</duration><title>Security Logging and Alerting Best Practices 14</title><description>In this video, I discuss the importance of logging and alerting for privileged account usage and changes in a secure environment. I emphasize the need to configure logging properly to track access and actions, especially for electronic medical record systems. I also highlight the significance of alerting for unauthorized access attempts. The video provides insights on where logging occurs, the scattered nature of sensitive data, and the need to encrypt everything. Action is requested to ensure logging is turned on, understand how to read logs, and implement logging and alerting best practices.</description></oembed>