Top 2 Reasons to Implement CIS Control 12

It’s far too easy to unintentionally skip out on implementing key CIS Controls. When unaware of the ways in which these controls can add layers to your security people lack prioritizing the [...]

November 19th, 2019 |Categories: CIS Controls, Cybersecurity, CIS Control 12

Let Your IT Company Manage Security Configurations for Network Devices

Establish. Implement. Actively Manage.

Security Configuration of Network Infrastructure Devices

How important to you and your company is it to prevent cyber criminals from attacking your network and exploiting vulnerable services and settings? If you are not actively implementing and [...]

How Mature Are Your Data Recovery Capabilities?

This month we highlight the next CIS Control in The IT Company’s blog series! The IT company has walked you through the first nine CIS Controls, which means we are about halfway through the [...]

Do Software Packages Install Services Without You Knowing?

CIS Control 9 is up next! CIS Control 9 is titled as the Limitation and Control of Network Ports, Protocols and Services.

Are Your Defenses Against Malware Strong Enough?

The IT Company Blog Series is back with another CIS Control blog! Next up is CIS Control 8.

CIS Control 7

The IT Company has walked you through CIS Controls 1 through 6. Today, we have chosen to narrow in on Control 7- Email and Web Browser Protections. 

April 16th, 2019 |Categories: Control 7, CIS, Protect, Security, CIS Controls, Email, Web Browsers

CIS Control 6

The IT Company blog series is back with another CIS control! In previous blogs, we have walked you through the understanding and importance of CIS controls 1 and 2, control 3, control 4 and [...]

March 5th, 2019 |Categories: Technology, CIS Controls

CIS Control 5

Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers- CIS Control 5 is one that a lot of companies fall short of, due to the difficulty to stay on [...]

CIS Control 4

The last few months we’ve taken you through the steps and importance of CIS Controls 1,2 and 3. Today, we introduce you to another vital piece in your security, CIS Control 4.

November 20th, 2018 |Categories: Monitor, Malware, Security, CIS Controls, Remediation
1 2 Next