by Peter Dietrich | Jan 3, 2019 | Blog, CIS Critical Security Controls
4:00 min read | Transmitting and receiving data via network ports is a necessary evil. Because your network process uses a specific port to communicate to another port there is no avoiding the inherent risk. The most perilous services on a network are the ones you...
by Peter Dietrich | Dec 11, 2018 | Blog, CIS Critical Security Controls
4:30 min read | Malware is a type of computer program designed to infect a legitimate user’s computer with the intent to inflict harm. Malware comes in various forms such as, viruses, Trojans, spyware, worms, etc. Malware is a huge and growing problem, costing...
by Peter Dietrich | Nov 9, 2018 | Blog, CIS Critical Security Controls
3:45 min read | Web browsers and email clients are very common points of entry for malicious code due to their daily usage by users. Content can be manipulated to entice users into taking actions that can greatly increase risk resulting in loss of data and other...
by Peter Dietrich | Oct 27, 2018 | Blog, CIS Critical Security Controls
2:30 min read | When properly implemented, Control #6 can bring an organization’s security program to a higher level of maturity. Maintaining, monitoring and analyzing audit logs helps gain visibility into the actual workings of an environment. Also, with proper...
by Peter Dietrich | Sep 14, 2018 | Blog, CIS Critical Security Controls
3:30 min read | A compromise of any account is a problem, but it’s especially serious when an outsider gains access to an administrative account. An intruder with full control of a device, website or database and can do serious damage. CIS Control #5’s message...