by Peter Dietrich | Jun 22, 2018 | Events
Join us for the Bi-monthly User Group Meeting Check Point User Group in the DMV. Agenda includes networking, Check Point feature overview & open discussion. Pizza & drinks provided. Thursday, June 28, 2018, 6:30 PM Anchor Technologies, Inc. 6315 Hillside...
by Peter Dietrich | Jun 13, 2018 | Blog, CIS Critical Security Controls
4:00 min read | The first of the CIS Controls for internet security is taking an inventory of authorized and unauthorized devices/hardware. The second CIS control is so similar it’s natural to wonder why it was granted its own control: an inventory of authorized and...
by Peter Dietrich | May 6, 2018 | Blog, CIS Critical Security Controls
4:00 min read | The CIS Controls provide a clear and elegant, if not always simple, framework for a cybersecurity plan. From the Center for Internet Security, the top 5 in order of priority: And inventory of authorized and unauthorized devices. An inventory of...
by Peter Dietrich | Mar 27, 2018 | News
CRN’s annual Tech Elite 250 list honors an exclusive group of North American IT solution providers that have earned the highest number of advanced technical certifications from leading IT vendors. Continued training and education are critical not only to provide...
by Peter Dietrich | Mar 13, 2018 | Blog
1:30 min read | As the pace of security breaches continues to accelerate, a common thread in most breaches is the exploitation of a technical vulnerability–in either the operating system or an application running on top of the operating system. Just in the past...