by Perry Lynch | Jan 3, 2020 | Blog, CIS Critical Security Controls
4:00 min read | The CIS controls have covered basic network practices, user and account management, software protection, hardware issues, and human concerns. In the end, the question remains, do these measures adequately prevent or combat hostile actions? Being...
by Perry Lynch | Dec 16, 2019 | Blog, CIS Critical Security Controls
3:35 min read | Implementing all the CIS controls won’t guarantee there will never be a successful attack on your systems. Sooner or later, someone could penetrate defenses and access confidential information or deposit malware. To be prepared, you need an incident...
by Perry Lynch | Nov 8, 2019 | Blog, CIS Critical Security Controls
3:35 min read | Flaws in software can leave your information systems vulnerable to attacks. Information about bugs in popular commercial and open-source software is available to everyone. Attackers exploit them once they’re known, so keeping up with patch...
by Perry Lynch | Sep 2, 2019 | Blog, CIS Critical Security Controls
3:20 min read | Security Awareness Training is one of the most cost-effective ways to improve your organization’s overall security posture. Most breaches are at least partly due to human error, and while nothing can be done to completely eliminate errors, a good...
by Perry Lynch | Aug 24, 2019 | Blog, CIS Critical Security Controls
3:30 min read | Account hijacking lets criminals impersonate employees and contractors. They can trick others into getting information and gain access to systems. It’s especially dangerous when they get control of inactive accounts, since they might escape...
by Perry Lynch | Jul 7, 2019 | Blog, CIS Critical Security Controls
3:45 min read | Wireless access presents a special challenge for network security. A weak security implementation will allow intruders to gain an almost physical level of access; they may be able to bypass your firewall and directly connect to your information systems...