Innovation: Leading not following

CIT Recognized nationally for cybersecurity leadership The world of IT doesn’t stand still. Throw in Cybersecurity and the pace of change is incredible. CIT prides itself in a culture of continual change and innovation. We are the service provider of choice for businesses whose information is central and critical to the organization. Recently, ChannelPro magazine…

Details

Breakfast: Operational Due Diligence Meets Small Business – Nightmares from the other side.

BREAKFAST AND CYBERSECURITY Cyber risks due to third party vendors is of the fastest growing vectors of attack Lawrence Cruciana will speak on how enterprises are turning to Third Party Due Diligence (3PDD) This is a preview of his RSA Conference 2019 presentation Wednesday, February 20th 7:45 to 9:30 Corporate Information Technologies 8801 J.M. Keynes…

Details

Cruciana to speak about the “Operational Due Diligence meets Small Business”

Corporate Information Technologies, a leading Managed Security Service Provider, today announced that its President and Chief Systems Engineer, Lawrence Cruciana will speak about the “Operational Due Diligence meets Small Business – Nightmares from the Other Side” at the RSA Conference 2019 USA. Cruciana will be speaking Tuesday, Mar 05 03:40 P.M. – 04:30 P.M. RSA Conference conducts…

Details

Hurricane Florence Ready?

Corporate Information Technologies is ahead and prepared for the potential impact Hurricane Florence may cause it’s clients.  On Monday our preparations started with this email . . . Hurricane Florence is presently moving toward the Southeastern United States.  The storm’s impact is anticipated to be severe in CIT’s service area ranging from upstate South Carolina…

Details

The Critical Security Controls (CSC) – 5

Critical Security Controls – Control 5 – Configuration of the Operating System Control 5 requires the creation of secure baseline configurations for each of these systems. These configurations should dictate the removal of insecure or outdated settings or software. Using a standards-based configuration scanner then continuously comparing the configuration of network-attached systems against this/these baselines…

Details