CIS

/Tag:CIS

How Mature Are Your Data Recovery Capabilities?

This month we highlight the next CIS Control in The IT Company’s blog series! The IT company has walked you through the first nine CIS Controls, which means we are about halfway through the controls! In case you haven’t been keeping up we with The IT Company’s blog series, we thought this would be the [...]

July 2nd, 2019|Categories: CIS Controls, Cyberattack|Tags: , , , |

CIS Control 7

The IT Company has walked you through CIS Controls 1 through 6. Today, we have chosen to narrow in on Control 7- Email and Web Browser Protections.  CIS Control 7 focuses on the vulnerability of email clients and web browsers due to the amount of end-user interaction.  Organizations should ensure they are running fully supported and [...]

April 16th, 2019|Categories: CIS Controls, Security|Tags: , , , , |

CIS Controls Series

Today’s blog is an introduction to the newest addition to our variety of technical topics- a series on CIS Controls! Before we dive into the details of each control, we would like to take this opportunity to show the value that this list can add to your organizations Cyber resilience. So what are CIS Controls? [...]

September 18th, 2018|Categories: CIS Controls, Security|Tags: , , |