by Peter Dietrich | Jun 13, 2018 | Blog, CIS Critical Security Controls
4:00 min read | The first of the CIS Controls for internet security is taking an inventory of authorized and unauthorized devices/hardware. The second CIS control is so similar it’s natural to wonder why it was granted its own control: an inventory of authorized and...
by Peter Dietrich | May 6, 2018 | Blog, CIS Critical Security Controls
4:00 min read | The CIS Controls provide a clear and elegant, if not always simple, framework for a cybersecurity plan. From the Center for Internet Security, the top 5 in order of priority: And inventory of authorized and unauthorized devices. An inventory of...
by Michele Dietrich | May 4, 2018 | Blog
1:45 min read Every once in a while in the annals of cybersecurity there is news that isn’t a warning about the newest breach or the release of the latest patch. In this case the news is good for Maryland buyers of cybersecurity. The General Assembly of Maryland, on...
by Peter Dietrich | Mar 27, 2018 | News
CRN’s annual Tech Elite 250 list honors an exclusive group of North American IT solution providers that have earned the highest number of advanced technical certifications from leading IT vendors. Continued training and education are critical not only to provide...
by Michele Dietrich | Mar 19, 2018 | Blog, CIS Critical Security Controls
1:35min read | We have considered individually the Center for Internet Security’s top 5 controls for effective cyber defense. Together, they are a force. Perhaps you’re already aware of CIS’s statistic. Of the 20 controls, to implement just the top 5 reduces known...