by Perry Lynch | Jul 7, 2019 | Blog, CIS Critical Security Controls
3:45 min read | Wireless access presents a special challenge for network security. A weak security implementation will allow intruders to gain an almost physical level of access; they may be able to bypass your firewall and directly connect to your information systems...
by Perry Lynch | Jun 22, 2019 | Blog, CIS Critical Security Controls
2:45 min read | The fewer ways there are to reach information, the less risk there is of unauthorized access. This is the point of CIS Control #14, “Controlled Access Based on the Need to Know.” This is closely related to Control #13, “Data...
by Perry Lynch | May 13, 2019 | Blog, CIS Critical Security Controls
4:00 min read | Everything in systems security ultimately is about protecting data. CIS Control #13, deals with data protection in its most direct sense. The main issues are identifying sensitive data, preventing its unauthorized transfer, detecting any such...
by Perry Lynch | Apr 11, 2019 | Blog, CIS Critical Security Controls
3:30 min read | Defending network boundaries is an increasingly complicated and difficult task. Cloud services, remote access, and mobile devices can make it difficult to identify the exact boundaries of a network. CIS Control #12, which deals with the defense of...
by Perry Lynch | Mar 13, 2019 | Blog, CIS Critical Security Controls
3:30 min read | Firewalls, routers, and switches play a critical role in network security. How well they succeed depends on the level of attention administrators pay to their configuration. CIS Control #11 addresses the need to configure network devices carefully and...