Anchor Technologies, Inc.
  • Solutions
    • Managed Planning & Prevention
    • Governance, Risk & Compliance
    • Cyber Risk Identification
    • Incident Response & Mitigation
  • Capabilities
    • Advisory
    • Integration
    • Education
  • Insights
  • About
  • Contact
Select Page
CIS Control #17: Implement a Security Awareness and Training Program

CIS Control #17: Implement a Security Awareness and Training Program

by Perry Lynch | Sep 2, 2019 | Blog, CIS Critical Security Controls

3:20 min read | Security Awareness Training is one of the most cost-effective ways to improve your organization’s overall security posture. Most breaches are at least partly due to human error, and while nothing can be done to completely eliminate errors, a good...
CIS Security Control #7: Email and Web Browser Protections

CIS Security Control #7: Email and Web Browser Protections

by Peter Dietrich | Nov 9, 2018 | Blog, CIS Critical Security Controls

3:45 min read | Web browsers and email clients are very common points of entry for malicious code due to their daily usage by users. Content can be manipulated to entice users into taking actions that can greatly increase risk resulting in loss of data and other...
Human Security Risk: Phlagged as High Priority? Email Phishing

Human Security Risk: Phlagged as High Priority? Email Phishing

by Michele Dietrich | Jan 4, 2018 | Blog

3:00 min read Of all the typical applications in most organizations, email is perhaps the most basic and essential. Any systems administrator knows that if email goes down they will hear about it. Email is a tool; increasingly it’s a weapon as well. In terms of...

Recent Posts

  • CMMC | Securing the Supply Chain
  • Anchor to launch new product, myCYPR, at the RSA Conference in Feb. 2020
  • Case Study: Penetration Testing
  • CIS CONTROL #20: Penetration Tests and Red Team Exercises

Categories

Archives

  • ►2020 (4)
    • ►June (1)
    • ►February (1)
    • ►January (2)
  • ►2019 (11)
    • ►December (1)
    • ►November (1)
    • ►September (1)
    • ►August (1)
    • ►July (1)
    • ►June (1)
    • ►May (1)
    • ►April (1)
    • ►March (1)
    • ►February (1)
    • ►January (1)
  • ►2018 (28)
    • ►December (1)
    • ►November (1)
    • ►October (1)
    • ►September (1)
    • ►August (1)
    • ►July (4)
    • ►June (2)
    • ►May (2)
    • ►March (3)
    • ►February (3)
    • ►January (9)

Tags

account theft Administrative Privileges assessment audit log authorized Backup Boundary Defense Check Point CIS control configuration Cybersecurity Investment Incentive Cybersecurity Tax Credit Data Data Loss Prevention Data Protection Data Recovery devices Email Encryption exploit Firewall human security risk IDS Integrity inventory IPS Legislation Malware Network Device network port Network Segmentation password patching penetration test phishing Remote Router scan Security Control software Switch unauthorized vulnerability vulnerability scanning web browser
Tweets by Path2Protection

Recent Posts

  • CMMC | Securing the Supply Chain
  • Anchor to launch new product, myCYPR, at the RSA Conference in Feb. 2020
  • Case Study: Penetration Testing
  • CIS CONTROL #20: Penetration Tests and Red Team Exercises
  • CIS Control #19: Incident Response and Management
  • CIS Control #18: Application Software Security
  • CIS Control #17: Implement a Security Awareness and Training Program
  • CIS Critical Security Control #16: Account Monitoring and Control

6315 Hillside Court, Suite J
Columbia, MD 21046
Howard County, Maryland, USA

410.295.7601 or toll free: 866.841.0777
info@anchortechnologies.com​

BREACH RESPONSE HOTLINE:
breach@anchortechnologies.com
866.841.0777, option #8

  • Facebook
  • Twitter