by Perry Lynch | Aug 24, 2019 | Blog, CIS Critical Security Controls
3:30 min read | Account hijacking lets criminals impersonate employees and contractors. They can trick others into getting information and gain access to systems. It’s especially dangerous when they get control of inactive accounts, since they might escape...
by Perry Lynch | Jul 7, 2019 | Blog, CIS Critical Security Controls
3:45 min read | Wireless access presents a special challenge for network security. A weak security implementation will allow intruders to gain an almost physical level of access; they may be able to bypass your firewall and directly connect to your information systems...
by Perry Lynch | Jun 22, 2019 | Blog, CIS Critical Security Controls
2:45 min read | The fewer ways there are to reach information, the less risk there is of unauthorized access. This is the point of CIS Control #14, “Controlled Access Based on the Need to Know.” This is closely related to Control #13, “Data...
by Perry Lynch | May 13, 2019 | Blog, CIS Critical Security Controls
4:00 min read | Everything in systems security ultimately is about protecting data. CIS Control #13, deals with data protection in its most direct sense. The main issues are identifying sensitive data, preventing its unauthorized transfer, detecting any such...
by Perry Lynch | Apr 11, 2019 | Blog, CIS Critical Security Controls
3:30 min read | Defending network boundaries is an increasingly complicated and difficult task. Cloud services, remote access, and mobile devices can make it difficult to identify the exact boundaries of a network. CIS Control #12, which deals with the defense of...