by Michele Dietrich | Jun 30, 2020 | Blog
Business losses due to cybercrime is expected to top $5 trillion by 2024 and the threat this poses to the Defense Industrial Base (DIB) is alarming. With over 300,000 businesses and organizations that make up the DIB, a cyber-attack could result in devastating losses...
by Perry Lynch | Jan 3, 2020 | Blog, CIS Critical Security Controls
4:00 min read | The CIS controls have covered basic network practices, user and account management, software protection, hardware issues, and human concerns. In the end, the question remains, do these measures adequately prevent or combat hostile actions? Being...
by Perry Lynch | Nov 8, 2019 | Blog, CIS Critical Security Controls
3:35 min read | Flaws in software can leave your information systems vulnerable to attacks. Information about bugs in popular commercial and open-source software is available to everyone. Attackers exploit them once they’re known, so keeping up with patch...
by Perry Lynch | Jun 22, 2019 | Blog, CIS Critical Security Controls
2:45 min read | The fewer ways there are to reach information, the less risk there is of unauthorized access. This is the point of CIS Control #14, “Controlled Access Based on the Need to Know.” This is closely related to Control #13, “Data...
by Perry Lynch | May 13, 2019 | Blog, CIS Critical Security Controls
4:00 min read | Everything in systems security ultimately is about protecting data. CIS Control #13, deals with data protection in its most direct sense. The main issues are identifying sensitive data, preventing its unauthorized transfer, detecting any such...