by Peter Dietrich | Jun 13, 2018 | Blog, CIS Critical Security Controls
4:00 min read | The first of the CIS Controls for internet security is taking an inventory of authorized and unauthorized devices/hardware. The second CIS control is so similar it’s natural to wonder why it was granted its own control: an inventory of authorized and...
by Peter Dietrich | May 6, 2018 | Blog, CIS Critical Security Controls
4:00 min read | The CIS Controls provide a clear and elegant, if not always simple, framework for a cybersecurity plan. From the Center for Internet Security, the top 5 in order of priority: And inventory of authorized and unauthorized devices. An inventory of...
by Michele Dietrich | Mar 19, 2018 | Blog, CIS Critical Security Controls
1:35min read | We have considered individually the Center for Internet Security’s top 5 controls for effective cyber defense. Together, they are a force. Perhaps you’re already aware of CIS’s statistic. Of the 20 controls, to implement just the top 5 reduces known...