Insights
Cybersecurity information, thoughts and opinions you can actually use.
Blog
Providing insight, opinion and information to help define the problem, determine the solution and understand the cybersecurity landscape.
CIS Critical Security Control #10: Data Recovery Capability
3:45 min read | In the event of a security breach of your network, it is likely that the attackers have altered or destroyed important data and security configurations. The tenth CIS control, data recovery capabilities, addresses the importance of backing-up system...
CIS Critical Security Control #9: Limitation & Control of Network Ports, Protocols and Services
4:00 min read | Transmitting and receiving data via network ports is a necessary evil. Because your network process uses a specific port to communicate to another port there is no avoiding the inherent risk. The most perilous services on a network are the ones you...
CIS Critical Security Control #8: Malware Defenses
4:30 min read | Malware is a type of computer program designed to infect a legitimate user’s computer with the intent to inflict harm. Malware comes in various forms such as, viruses, Trojans, spyware, worms, etc. Malware is a huge and growing problem, costing...
CIS Security Control #7: Email and Web Browser Protections
3:45 min read | Web browsers and email clients are very common points of entry for malicious code due to their daily usage by users. Content can be manipulated to entice users into taking actions that can greatly increase risk resulting in loss of data and other...
CIS Security Control #6: Maintenance, Monitoring & Analysis of Audit Logs
2:30 min read | When properly implemented, Control #6 can bring an organization’s security program to a higher level of maturity. Maintaining, monitoring and analyzing audit logs helps gain visibility into the actual workings of an environment. Also, with proper...
CIS Critical Security Control #5: Controlled Use of Administrative Privileges
3:30 min read | A compromise of any account is a problem, but it's especially serious when an outsider gains access to an administrative account. An intruder with full control of a device, website or database and can do serious damage. CIS Control #5’s message is to...
Corporate News
What’s going on with Anchor? These postings will give you a sense of what is happening with the organization, our team and give you a sense of our culture.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Upcoming Events
Anchor hosts numerous activities and events every year to grow the cybersecurity community, educate our clients and friends. Stay tuned here for what’s coming up.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Join Our Newsletter
True cybersecurity is a journey. Threats and vulnerabilities are ever evolving. Define your strategy, identify your risk, and manage that risk today — before its to late.