by Peter Dietrich | Nov 9, 2018 | Blog, CIS Critical Security Controls
3:45 min read | Web browsers and email clients are very common points of entry for malicious code due to their daily usage by users. Content can be manipulated to entice users into taking actions that can greatly increase risk resulting in loss of data and other...
by Peter Dietrich | Oct 27, 2018 | Blog, CIS Critical Security Controls
2:30 min read | When properly implemented, Control #6 can bring an organization’s security program to a higher level of maturity. Maintaining, monitoring and analyzing audit logs helps gain visibility into the actual workings of an environment. Also, with proper...
by Peter Dietrich | Sep 14, 2018 | Blog, CIS Critical Security Controls
3:30 min read | A compromise of any account is a problem, but it’s especially serious when an outsider gains access to an administrative account. An intruder with full control of a device, website or database and can do serious damage. CIS Control #5’s message...
by Peter Dietrich | Aug 9, 2018 | Blog, CIS Critical Security Controls
3:30 min read | Vulnerabilities on Internet connected systems are targeted on a daily basis. The fourth CIS control addresses the need to keep them protected. “Continuous Vulnerability Assessment and Remediation” addresses keeping up with and fixing newly...
by Peter Dietrich | Jul 20, 2018 | Blog, CIS Critical Security Controls
3:30 min read | The first two CIS Controls for Internet security address keeping an inventory of hardware and software. The third CIS Control deals with secure system configurations. Its central principle is that a strict process for change control and configuration...