Hurricane Florence Ready?

Corporate Information Technologies is ahead and prepared for the potential impact Hurricane Florence may cause it’s clients.  On Monday our preparations started with this email . . . Hurricane Florence is presently moving toward the Southeastern United States.  The storm’s impact is anticipated to be severe in CIT’s service area ranging from upstate South Carolina…

The Critical Security Controls (CSC) – 5

Critical Security Controls – Control 5 – Configuration of the Operating System Control 5 requires the creation of secure baseline configurations for each of these systems. These configurations should dictate the removal of insecure or outdated settings or software. Using a standards-based configuration scanner then continuously comparing the configuration of network-attached systems against this/these baselines…

CIT’s Open House — August 23rd

  After 20 years in NoDa, CIT has moved up to One University Place Come see how our changes set the stage for your next 20 years 8801 J M Keynes Dr Suite 250, Charlotte NC 28262 Open House, Thursday August 23rd   4-6pm   Corporate Information Technologies, one of the Southeast’s leading technology and…

Critical Security Control (CSC) 4

Critical Security Control 4 – Controlled use of Administrative Access System admin level permissions seem to be everywhere. These permissions are commonly required to install applications, to make changes to a computer, and do much of anything. Satisfying Control 4’s requirements can be achieved by following some common-sense, yet rarely implemented, actions. Understanding and controlling…

The Critical Security Controls (CSC) 3 – Analysis of a Computer System

CSC 3 – Continuous Vulnerability Management Computer networks are very similar to modern buildings; they are combination of numerous highly complex systems. Each constituent system introduces some level of vulnerability and therefore risk into the larger system as a whole. Control 3 requires the use of a standards-based vulnerability scanner to evaluate each computer system…