by Perry Lynch | Mar 13, 2019 | Blog, CIS Critical Security Controls
3:30 min read | Firewalls, routers, and switches play a critical role in network security. How well they succeed depends on the level of attention administrators pay to their configuration. CIS Control #11 addresses the need to configure network devices carefully and...
by Peter Dietrich | May 6, 2018 | Blog, CIS Critical Security Controls
4:00 min read | The CIS Controls provide a clear and elegant, if not always simple, framework for a cybersecurity plan. From the Center for Internet Security, the top 5 in order of priority: And inventory of authorized and unauthorized devices. An inventory of...
by Michele Dietrich | Jan 23, 2018 | Blog
3:00 min read The principle of least effort is sensible in many cases, but it’s a poor guide to computer security and an uncomplicated human security risk. If a device or software service comes with a default password, failing to change it will open security...