by Perry Lynch | Jun 22, 2019 | Blog, CIS Critical Security Controls
2:45 min read | The fewer ways there are to reach information, the less risk there is of unauthorized access. This is the point of CIS Control #14, “Controlled Access Based on the Need to Know.” This is closely related to Control #13, “Data...
by Perry Lynch | May 13, 2019 | Blog, CIS Critical Security Controls
4:00 min read | Everything in systems security ultimately is about protecting data. CIS Control #13, deals with data protection in its most direct sense. The main issues are identifying sensitive data, preventing its unauthorized transfer, detecting any such...
by Perry Lynch | Apr 11, 2019 | Blog, CIS Critical Security Controls
3:30 min read | Defending network boundaries is an increasingly complicated and difficult task. Cloud services, remote access, and mobile devices can make it difficult to identify the exact boundaries of a network. CIS Control #12, which deals with the defense of...
by Perry Lynch | Mar 13, 2019 | Blog, CIS Critical Security Controls
3:30 min read | Firewalls, routers, and switches play a critical role in network security. How well they succeed depends on the level of attention administrators pay to their configuration. CIS Control #11 addresses the need to configure network devices carefully and...
by Peter Dietrich | Feb 18, 2019 | Blog, CIS Critical Security Controls
3:45 min read | In the event of a security breach of your network, it is likely that the attackers have altered or destroyed important data and security configurations. The tenth CIS control, data recovery capabilities, addresses the importance of backing-up system...