TLDR Title Heading

Quick points from our Blog for crazy-busy people just like you.

Cruciana to speak about the “Operational Due Diligence meets Small Business”

Corporate Information Technologies, a leading Managed Security Service Provider, today announced that its President and Chief Systems Engineer, Lawrence Cruciana will speak about the “Operational Due Diligence meets Small Business – Nightmares from the Other Side” at the RSA Conference 2019 USA. Cruciana will be speaking Tuesday, Mar 05 03:40 P.M. – 04:30 P.M. RSA Conference conducts…

The Critical Security Controls (CSC) 6

Critical Control 6 – Check your audit logs frequently Modern day attackers rely on the fact that such organizations rarely look at the audit logs, which means they would not know that their systems have been compromised. Most organizations the system log is an overlooked and forgotten function. Every activity that has transpired on not…

The Critical Security Controls (CSC) – 5

Critical Security Controls – Control 5 – Configuration of the Operating System Control 5 requires the creation of secure baseline configurations for each of these systems. These configurations should dictate the removal of insecure or outdated settings or software. Using a standards-based configuration scanner then continuously comparing the configuration of network-attached systems against this/these baselines…

Critical Security Control (CSC) 4

Critical Security Control 4 – Controlled use of Administrative Access System admin level permissions seem to be everywhere. These permissions are commonly required to install applications, to make changes to a computer, and do much of anything. Satisfying Control 4’s requirements can be achieved by following some common-sense, yet rarely implemented, actions. Understanding and controlling…

systems monitoring

The Critical Security Controls (CSC) 2

Critical Security Controls – What’s installed, running, and able to run on your business computers Control 2 advances the framework into the inventory and control of Software installed and running on the computer assets within an organization. CSC 2 – Inventory and Control of Software Assets Software is what delivers the value through the complex…

The Critical Security Controls (CSC) -1

The Critical Security Controls (CSC) 1 – Modern cybersecurity is much like the early banking industry There is nearly no area of the banking business which has been unchanged by security threats over the years. The agents of the FBI and U.S. Secret Service persuaded successful bank robbers to help inform the defense of these…

20 Critical Security Controls

20 Critical Security Controls (20 CSC) SANS combined government-derived information security and real-life attacks in businesses of all sizes to inform appropriate defense. This created SANS original list of 10, which later became 20 critical security controls. These 20 Critical security controls are becoming more important everyday. Using these 20 CSC’s will make your organization…

Managed Service Providers

Managed Service Providers: Never have to worry about an issue again with 24×7 monitoring.   Managed service providers use remote monitoring and management tools to keep an eye on the performance and overall health of the IT infrastructure that powers your business operations. MSPs should be 24×7 and should quickly respond to any issue that…

Disaster Recovery

Disaster Recovery: Don’t let a negatively impacting event affect your organization Disaster Recovery is the ability to preserve an organizations data and systems through a negatively impacting event. With the onset of cloud computing, disaster recovery has become more efficient and affordable than ever. Today it is possible to back up data in minutes vs.…