Hurricane Florence Ready?

Corporate Information Technologies is ahead and prepared for the potential impact Hurricane Florence may cause it’s clients.  On Monday our preparations started with this email . . . Hurricane Florence is presently moving toward the Southeastern United States.  The storm’s impact is anticipated to be severe in CIT’s service area ranging from upstate South Carolina…

The Critical Security Controls (CSC) 6

Critical Control 6 – Check your audit logs frequently Modern day attackers rely on the fact that such organizations rarely look at the audit logs, which means they would not know that their systems have been compromised. Most organizations the system log is an overlooked and forgotten function. Every activity that has transpired on not…

The Critical Security Controls (CSC) – 5

Critical Security Controls – Control 5 – Configuration of the Operating System Control 5 requires the creation of secure baseline configurations for each of these systems. These configurations should dictate the removal of insecure or outdated settings or software. Using a standards-based configuration scanner then continuously comparing the configuration of network-attached systems against this/these baselines…

CIT’s Open House — August 23rd

  After 20 years in NoDa, CIT has moved up to One University Place Come see how our changes set the stage for your next 20 years 8801 J M Keynes Dr Suite 250, Charlotte NC 28262 Open House, Thursday August 23rd   4-6pm   Corporate Information Technologies, one of the Southeast’s leading technology and…

Critical Security Control (CSC) 4

Critical Security Control 4 – Controlled use of Administrative Access System admin level permissions seem to be everywhere. These permissions are commonly required to install applications, to make changes to a computer, and do much of anything. Satisfying Control 4’s requirements can be achieved by following some common-sense, yet rarely implemented, actions. Understanding and controlling…

systems monitoring

The Critical Security Controls (CSC) 2

Critical Security Controls – What’s installed, running, and able to run on your business computers Control 2 advances the framework into the inventory and control of Software installed and running on the computer assets within an organization. CSC 2 – Inventory and Control of Software Assets Software is what delivers the value through the complex…