Hurricane Florence Ready?

Corporate Information Technologies is ahead and prepared for the potential impact Hurricane Florence may cause it’s clients.  On Monday our preparations started with this email . . . Hurricane Florence is presently moving toward the Southeastern United States.  The storm’s impact is anticipated to be severe in CIT’s service area ranging from upstate South Carolina…

Details

The Critical Security Controls (CSC) – 5

Critical Security Controls – Control 5 – Configuration of the Operating System Control 5 requires the creation of secure baseline configurations for each of these systems. These configurations should dictate the removal of insecure or outdated settings or software. Using a standards-based configuration scanner then continuously comparing the configuration of network-attached systems against this/these baselines…

Details

Critical Security Control (CSC) 4

Critical Security Control 4 – Controlled use of Administrative Access System admin level permissions seem to be everywhere. These permissions are commonly required to install applications, to make changes to a computer, and do much of anything. Satisfying Control 4’s requirements can be achieved by following some common-sense, yet rarely implemented, actions. Understanding and controlling…

Details

The Critical Security Controls (CSC) 3 – Analysis of a Computer System

CSC 3 – Continuous Vulnerability Management Computer networks are very similar to modern buildings; they are combination of numerous highly complex systems. Each constituent system introduces some level of vulnerability and therefore risk into the larger system as a whole. Control 3 requires the use of a standards-based vulnerability scanner to evaluate each computer system…

Details

20 Critical Security Controls

20 Critical Security Controls (20 CSC) SANS combined government-derived information security and real-life attacks in businesses of all sizes to inform appropriate defense. This created SANS original list of 10, which later became 20 critical security controls. These 20 Critical security controls are becoming more important everyday. Using these 20 CSC’s will make your organization…

Details