CIS Controls

/CIS Controls

Let Your IT Company Manage Security Configurations for Network Devices

Establish. Implement. Actively Manage. How often do you think about your company’s security configurations for network devices? Chances are, for most people the answer is rarely. Which is how it should be. Having an IT Company who manages technology aspects such as this allows you to focus on your role at your company, rather than [...]

August 27th, 2019|Categories: CIS Controls, Cyber Secure, IT provider|Tags: , , |

Security Configuration of Network Infrastructure Devices

How important to you and your company is it to prevent cyber criminals from attacking your network and exploiting vulnerable services and settings? If you are not actively implementing and managing a security configuration of network infrastructure devices, you need to read this. CIS Control 11 is next up in The IT Company’s CIS Controls blog [...]

July 23rd, 2019|Categories: CIS Controls, Cybersecurity|Tags: , , , |

How Mature Are Your Data Recovery Capabilities?

This month we highlight the next CIS Control in The IT Company’s blog series! The IT company has walked you through the first nine CIS Controls, which means we are about halfway through the controls! In case you haven’t been keeping up we with The IT Company’s blog series, we thought this would be the [...]

July 2nd, 2019|Categories: CIS Controls, Cyberattack|Tags: , , , |

Do Software Packages Install Services Without You Knowing?

CIS Control 9 is up next! CIS Control 9 is titled as the Limitation and Control of Network Ports, Protocols and Services. Center for Internet Security defines this fundamental control as “manage (track/control/correct) the ongoing operational use of ports, protocols and services on networked devices in order to minimize windows of vulnerability available to attackers.” [...]

May 28th, 2019|Categories: CIS Controls, Security|Tags: , , |

Are Your Defenses Against Malware Strong Enough?

The IT Company Blog Series is back with another CIS Control blog! Next up is CIS Control 8. CIS Control 8 is better known as Malware Defenses. CIS defines control 8 as “controlling the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to enable [...]

May 21st, 2019|Categories: CIS Controls, Malware|Tags: , , , , |

CIS Control 7

The IT Company has walked you through CIS Controls 1 through 6. Today, we have chosen to narrow in on Control 7- Email and Web Browser Protections.  CIS Control 7 focuses on the vulnerability of email clients and web browsers due to the amount of end-user interaction.  Organizations should ensure they are running fully supported and [...]

April 16th, 2019|Categories: CIS Controls, Security|Tags: , , , , |

CIS Control 6

The IT Company blog series is back with another CIS control! In previous blogs, we have walked you through the understanding and importance of CIS controls 1 and 2, control 3, control 4 and control 5. Today we are picking up with control 6! CIS control 6 is the Maintenance, Monitoring and Analysis of Audit Logs. [...]

March 5th, 2019|Categories: CIS Controls, Technology|

CIS Control 5

Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers- CIS Control 5 is one that a lot of companies fall short of, due to the difficulty to stay on top of it. However, CIS Control 5 is the biggest step in beginning to look at just how mature you want your company’s security [...]

January 22nd, 2019|Categories: CIS Controls, Security, Technology|Tags: , , , , , |

CIS Control 4

The last few months we’ve taken you through the steps and importance of CIS Controls 1,2 and 3. Today, we introduce you to another vital piece in your security, CIS Control 4. Control 4 is the continued vulnerability assessment remediation. Our first three controls give us an inventory of devices, the software on the network, [...]

November 20th, 2018|Categories: CIS Controls, Security|Tags: , , , |

CIS Control 3

Now that you’ve learned about CIS Controls 1 and 2, we want to transition into discussing the importance of CIS Control 3- Continuous Vulnerability Management.  As we talked about in the last CIS Control blog, controls 1 and 2 are building blocks to prepare for control 3. For control 1, you want to know what you have [...]

October 23rd, 2018|Categories: CIS Controls, Security|Tags: , , |