by Perry Lynch | Aug 24, 2019 | Blog, CIS Critical Security Controls
3:30 min read | Account hijacking lets criminals impersonate employees and contractors. They can trick others into getting information and gain access to systems. It’s especially dangerous when they get control of inactive accounts, since they might escape...
by Peter Dietrich | Jun 13, 2018 | Blog, CIS Critical Security Controls
4:00 min read | The first of the CIS Controls for internet security is taking an inventory of authorized and unauthorized devices/hardware. The second CIS control is so similar it’s natural to wonder why it was granted its own control: an inventory of authorized and...
by Peter Dietrich | May 6, 2018 | Blog, CIS Critical Security Controls
4:00 min read | The CIS Controls provide a clear and elegant, if not always simple, framework for a cybersecurity plan. From the Center for Internet Security, the top 5 in order of priority: And inventory of authorized and unauthorized devices. An inventory of...
by Michele Dietrich | Feb 9, 2018 | Blog
3:00 min read When an inventory of authorized and unauthorized devices seems daunting, a first step is a comprehensive approach to mapping what’s there. There are tools that can fundamentally help. One of our partners, ForeScout, has found that “what is...