by Peter Dietrich | Nov 9, 2018 | Blog
CIS Control 7 helps organizations reduce one of the most common entry points for malware—email clients and web browsers. By limiting browser plugins, securing email communication, filtering risky content, and enforcing URL restrictions, businesses can significantly lower their exposure to phishing, spoofing, and browser-based attacks.
by Peter Dietrich | Oct 27, 2018 | Blog
CIS Control 6 emphasizes the critical role of audit log management in detecting, understanding, and responding to cyberattacks. By properly configuring, storing, and analyzing logs across systems and network boundaries, organizations gain essential visibility into suspicious activity and strengthen their ability to detect and respond to threats in real time.
by Peter Dietrich | Sep 14, 2018 | Blog
CIS Control 5 emphasizes the importance of minimizing administrative privileges to reduce the risk of account compromise. By enforcing least privilege access, separating admin duties from everyday tasks, and implementing strong authentication practices, organizations can significantly limit the damage potential of compromised accounts and improve their overall security posture.
by Peter Dietrich | Aug 9, 2018 | Blog
CIS Control 4 highlights the critical need for continuous vulnerability assessment and remediation. By proactively scanning for software flaws, misconfigurations, and outdated systems—and rapidly deploying patches—organizations can significantly reduce the risk of cyberattacks and maintain a strong, secure IT environment.
by Peter Dietrich | Jul 20, 2018 | Blog
CIS Control 3 emphasizes the importance of secure configuration management for all hardware and software assets. Default settings are rarely secure—by implementing hardened configurations, disabling unnecessary services, and standardizing system images, organizations can reduce vulnerabilities, strengthen defenses, and maintain consistency across their environment.