Anchor Technologies, Inc.
  • Solutions
    • Managed Planning & Prevention
    • Governance, Risk & Compliance
    • Cyber Risk Identification
    • Incident Response & Mitigation
  • Capabilities
    • Advisory
    • Integration
    • Education
  • Insights
  • About
  • Contact
Select Page
CIS Security Control #7: Email and Web Browser Protections

CIS Security Control #7: Email and Web Browser Protections

by Peter Dietrich | Nov 9, 2018 | Blog, CIS Critical Security Controls

3:45 min read | Web browsers and email clients are very common points of entry for malicious code due to their daily usage by users. Content can be manipulated to entice users into taking actions that can greatly increase risk resulting in loss of data and other...
CIS Security Control #6: Maintenance, Monitoring & Analysis of Audit Logs

CIS Security Control #6: Maintenance, Monitoring & Analysis of Audit Logs

by Peter Dietrich | Oct 27, 2018 | Blog, CIS Critical Security Controls

2:30 min read | When properly implemented, Control #6 can bring an organization’s security program to a higher level of maturity. Maintaining, monitoring and analyzing audit logs helps gain visibility into the actual workings of an environment. Also, with proper...
CIS Critical Security Control #5: Controlled Use of Administrative Privileges

CIS Critical Security Control #5: Controlled Use of Administrative Privileges

by Peter Dietrich | Sep 14, 2018 | Blog, CIS Critical Security Controls

3:30 min read | A compromise of any account is a problem, but it’s especially serious when an outsider gains access to an administrative account. An intruder with full control of a device, website or database and can do serious damage. CIS Control #5’s message...
CIS Critical Security Control #4: Vulnerability Assessment & Remediation

CIS Critical Security Control #4: Vulnerability Assessment & Remediation

by Peter Dietrich | Aug 9, 2018 | Blog, CIS Critical Security Controls

3:30 min read | Vulnerabilities on Internet connected systems are targeted on a daily basis. The fourth CIS control addresses the need to keep them protected. “Continuous Vulnerability Assessment and Remediation” addresses keeping up with and fixing newly...
CIS Critical Security Control #3: Secure Configurations

CIS Critical Security Control #3: Secure Configurations

by Peter Dietrich | Jul 20, 2018 | Blog, CIS Critical Security Controls

3:30 min read | The first two CIS Controls for Internet security address keeping an inventory of hardware and software. The third CIS Control deals with secure system configurations. Its central principle is that a strict process for change control and configuration...
« Older Entries
Next Entries »

Recent Posts

  • eSentire Partner Anchor Technologies a Key Player in Growth and Success
  • The Metaverse Could Cost You Everything, If You Let It
  • Anchor Technologies, Inc. Launches New myCYPR Platform for Third-Party Risk Management (TPRM)
  • Vendor Risk Management (VRM)- How to Establish Trust

Categories

Tags

account theft Administrative Privileges assessment authorized CIS control CMMC CMMC Compliance Compliance Compromise configuration Cyber culture at work Data Data Loss Prevention Data Protection Department of Defense devices DoD Email Encryption Ethical Hack exploit Firewall gap analysis human security risk Integrity inventory myCYPR Network Device password patching penetration test phishing Risk Management Risk Rating RSA Conference scan Security Control software Test third-party third-party risk unauthorized Vendor security vulnerability vulnerability scanning
Tweets by Path2Protection
  • eSentire Partner Anchor Technologies a Key Player in Growth and Success
  • The Metaverse Could Cost You Everything, If You Let It
  • Anchor Technologies, Inc. Launches New myCYPR Platform for Third-Party Risk Management (TPRM)
  • Vendor Risk Management (VRM)- How to Establish Trust
  • Compliance Management via the Calendar and Automation
  • Creating a Culture of Cybersecurity at Work
  • What are Cybersecurity Risk Ratings?
  • Physical Security and Cyber Risk Management

6315 Hillside Court, Suite J
Columbia, MD 21046
Howard County, Maryland, USA

410.295.7601 or toll free: 866.841.0777
info@anchortechnologies.com​

Privacy Policies

BREACH RESPONSE HOTLINE: breach@anchortechnologies.com 866.841.0777, option #8

  • Facebook
  • Twitter