TLDR Title Heading

Quick points from our Blog for crazy-busy people just like you.

Critical Security Control (CSC) 4

Critical Security Control 4 – Controlled use of Administrative Access System admin level permissions seem to be everywhere. These permissions are commonly required to install applications, to make changes to a computer, and do much of anything. Satisfying Control 4’s requirements can be achieved by following some common-sense, yet rarely implemented, actions. Understanding and controlling…

The Critical Security Controls (CSC) 3 – Analysis of a Computer System

CSC 3 – Continuous Vulnerability Management Computer networks are very similar to modern buildings; they are combination of numerous highly complex systems. Each constituent system introduces some level of vulnerability and therefore risk into the larger system as a whole. Control 3 requires the use of a standards-based vulnerability scanner to evaluate each computer system…

20 Critical Security Controls

20 Critical Security Controls (20 CSC) SANS combined government-derived information security and real-life attacks in businesses of all sizes to inform appropriate defense. This created SANS original list of 10, which later became 20 critical security controls. These 20 Critical security controls are becoming more important everyday. Using these 20 CSC’s will make your organization…

Managed Service Providers

Managed Service Providers: Never have to worry about an issue again with 24×7 monitoring.   Managed service providers use remote monitoring and management tools to keep an eye on the performance and overall health of the IT infrastructure that powers your business operations. MSPs should be 24×7 and should quickly respond to any issue that…

Disaster Recovery

Disaster Recovery: Don’t let a negatively impacting event affect your organization Disaster Recovery is the ability to preserve an organizations data and systems through a negatively impacting event. With the onset of cloud computing, disaster recovery has become more efficient and affordable than ever. Today it is possible to back up data in minutes vs.…

Cyber-Killchain

Cyber-Killchain The process of a cyber-killchain is much like the process of an everyday burglar. These burglars take multiple steps before they actually rob your home, car, or business. The killchain is the common steps that are used by these cyber-burglars. This being the case, it’s important for defenders to pay attention and use the…

Ransomware

RANSOMWARE: CYBER-THUGS WANT YOUR BITCOIN Ransomware is a malicious software created by cyber-thugs who got picked on when they were young. These cyber-thugs are an organization that can’t get any money from their country so they prey on the US. Most RW variants are coming out of Russia, Ukraine, North Korea, China and India. Extorting…