by Peter Dietrich | Feb 18, 2019 | Blog, CIS Critical Security Controls
3:45 min read | In the event of a security breach of your network, it is likely that the attackers have altered or destroyed important data and security configurations. The tenth CIS control, data recovery capabilities, addresses the importance of backing-up system...
by Peter Dietrich | Jan 3, 2019 | Blog, CIS Critical Security Controls
4:00 min read | Transmitting and receiving data via network ports is a necessary evil. Because your network process uses a specific port to communicate to another port there is no avoiding the inherent risk. The most perilous services on a network are the ones you...
by Peter Dietrich | Dec 11, 2018 | Blog, CIS Critical Security Controls
4:30 min read | Malware is a type of computer program designed to infect a legitimate user’s computer with the intent to inflict harm. Malware comes in various forms such as, viruses, Trojans, spyware, worms, etc. Malware is a huge and growing problem, costing...
by Peter Dietrich | Nov 9, 2018 | Blog, CIS Critical Security Controls
3:45 min read | Web browsers and email clients are very common points of entry for malicious code due to their daily usage by users. Content can be manipulated to entice users into taking actions that can greatly increase risk resulting in loss of data and other...
by Peter Dietrich | Oct 27, 2018 | Blog, CIS Critical Security Controls
2:30 min read | When properly implemented, Control #6 can bring an organization’s security program to a higher level of maturity. Maintaining, monitoring and analyzing audit logs helps gain visibility into the actual workings of an environment. Also, with proper...