by Perry Lynch | Dec 16, 2019 | Blog
CIS Control 19 emphasizes the importance of having a structured incident response plan in place before a cyberattack occurs. From assigning roles to establishing reporting procedures and conducting regular training, a well-prepared response team can significantly reduce the impact of a security incident and ensure fast, effective recovery.
by Perry Lynch | Nov 8, 2019 | Blog
CIS Control 18 focuses on application software security, emphasizing the need to design, develop, and maintain secure applications—whether commercial, open-source, or built in-house. Timely patching, secure coding practices, and ongoing testing are essential to reducing vulnerabilities and defending against zero-day threats.
by Perry Lynch | Sep 2, 2019 | Blog
CIS Control 17 emphasizes the importance of ongoing security awareness training to reduce human error—one of the leading causes of security breaches. From targeted skill assessments to social engineering exercises, an effective program builds lasting security habits, helping employees recognize and avoid evolving threats.
by Perry Lynch | Aug 24, 2019 | Blog
CIS Control 16 focuses on preventing account hijacking by securing user credentials, managing account lifecycles, and monitoring account activity for suspicious behavior. From strong password practices and two-factor authentication to timely deactivation of stale accounts, this control helps reduce the risk of impersonation and unauthorized access.
by Perry Lynch | Jul 7, 2019 | Blog
CIS Control 15 outlines how to secure wireless access by enforcing strict policies, maintaining updated protocols, and monitoring for unauthorized devices. From managing access points and restricting guest access to detecting rogue connections, proper wireless access control is essential to minimizing risk and protecting enterprise networks.