by Peter Dietrich | Jun 13, 2018 | Blog
CIS Control 2 emphasizes the importance of maintaining an up-to-date inventory of all authorized and unauthorized software. Software changes rapidly, and without visibility into what’s installed across your network, you risk exposing your organization to vulnerabilities, malware, and compliance violations. Tracking versions, restricting unauthorized installations, and establishing a baseline of approved software are essential steps in protecting against evolving threats.
by Peter Dietrich | May 6, 2018 | Blog
CIS Control 1 focuses on establishing and maintaining an accurate inventory of all authorized and unauthorized devices across your network. Without clear visibility into what’s connected, organizations are vulnerable to unknown endpoints, misconfigurations, and security gaps. A well-maintained device inventory forms the foundation for every other cybersecurity control and is essential to identifying rogue devices, enforcing security policies, and responding to threats with speed and confidence.
by Michele Dietrich | May 4, 2018 | Blog
Maryland Cybersecurity Investment Incentive Tax Credit (CIITC) Every once in a while in the annals of cybersecurity there is news that isn’t a warning about the newest breach or the release of the latest patch. In this case the news is good for Maryland buyers of...
by Peter Dietrich | Mar 27, 2018 | News
Anchor Technologies, Inc. Listed on the 2018 CRN Tech Elite 250 Anchor Technologies is proud to share it was recognized on the CRN 2018 Tech Elite 250— an exclusive award honoring top IT solution providers in North America who have earned earned the highest level of...
by Michele Dietrich | Mar 19, 2018 | Blog
CIS Critical Security Controls: The Essentials We have considered individually the Center for Internet Security’s top 5 controls for effective cyber defense. Together, they are a force. Perhaps you’re already aware of CIS’s statistic. Of the 20 controls, to implement...