CIS Controls

/CIS Controls

Do Software Packages Install Services Without You Knowing?

CIS Control 9 is up next! CIS Control 9 is titled as the Limitation and Control of Network Ports, Protocols and Services. Center for Internet Security defines this fundamental control as “manage (track/control/correct) the ongoing operational use of ports, protocols and services on networked devices in order to minimize windows of vulnerability available to attackers.” [...]

May 28th, 2019|Categories: CIS Controls, Security|Tags: , , |

Are Your Defenses Against Malware Strong Enough?

The IT Company Blog Series is back with another CIS Control blog! Next up is CIS Control 8. CIS Control 8 is better known as Malware Defenses. CIS defines control 8 as “controlling the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to enable [...]

May 21st, 2019|Categories: CIS Controls, Malware|Tags: , , , , |

CIS Control 7

The IT Company has walked you through CIS Controls 1 through 6. Today, we have chosen to narrow in on Control 7- Email and Web Browser Protections.  CIS Control 7 focuses on the vulnerability of email clients and web browsers due to the amount of end-user interaction.  Organizations should ensure they are running fully supported and [...]

April 16th, 2019|Categories: CIS Controls, Security|Tags: , , , , |

CIS Control 6

The IT Company blog series is back with another CIS control! In previous blogs, we have walked you through the understanding and importance of CIS controls 1 and 2, control 3, control 4 and control 5. Today we are picking up with control 6! CIS control 6 is the Maintenance, Monitoring and Analysis of Audit Logs. [...]

March 5th, 2019|Categories: CIS Controls, Technology|

CIS Control 5

Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers- CIS Control 5 is one that a lot of companies fall short of, due to the difficulty to stay on top of it. However, CIS Control 5 is the biggest step in beginning to look at just how mature you want your company’s security [...]

January 22nd, 2019|Categories: CIS Controls, Security, Technology|Tags: , , , , , |

CIS Control 4

The last few months we’ve taken you through the steps and importance of CIS Controls 1,2 and 3. Today, we introduce you to another vital piece in your security, CIS Control 4. Control 4 is the continued vulnerability assessment remediation. Our first three controls give us an inventory of devices, the software on the network, [...]

November 20th, 2018|Categories: CIS Controls, Security|Tags: , , , |

CIS Control 3

Now that you’ve learned about CIS Controls 1 and 2, we want to transition into discussing the importance of CIS Control 3- Continuous Vulnerability Management.  As we talked about in the last CIS Control blog, controls 1 and 2 are building blocks to prepare for control 3. For control 1, you want to know what you have [...]

October 23rd, 2018|Categories: CIS Controls, Security|Tags: , , |

CIS Controls 1 & 2

Beginning our series discussing each individual CIS Control, are controls 1 and 2. Both of which are absolutely critical points for securing your network. While these are extremely important, they are two steps a lot of people skip. The reasoning and intention behind these two controls is to prepare you for the remaining 18 controls [...]

September 25th, 2018|Categories: CIS Controls, Security|Tags: , , |

CIS Controls Series

Today’s blog is an introduction to the newest addition to our variety of technical topics- a series on CIS Controls! Before we dive into the details of each control, we would like to take this opportunity to show the value that this list can add to your organizations Cyber resilience. So what are CIS Controls? [...]

September 18th, 2018|Categories: CIS Controls, Security|Tags: , , |