The Latest Cyber Security News and Updates
Feb
5
CIS Control 6: Maintenance, Monitoring, and Analysis of Audit Logs What is CIS Control 6? CIS Control 6 focuses on collecting, managing, and analyzing audit logs of events that could help your…
READ MORE
CIS Control 5: Secure Configuration for Hardware and Software on Devices What is CIS Control 5? The CIS controls are a set of actions that protect your organization from the most pervasive…
Jan
29
CIS Control 4: Controlled Use of Administrative Privileges What is CIS Control 4? The CIS controls are a set of actions that protect your organization from the most pervasive cyber attacks. There…
26
CIS Control 3: Continuous Vulnerability Control Management What is CIS Control 3? The CIS controls are a set of actions that protect your organization from the most pervasive cyber attacks. There are…
25
CIS Control 2: Inventory and Control of Software Assets What is CIS Control 2? CIS Control 2 is the second control within a framework of 20 critical controls. The CIS Controls are…
22
CIS Control 1: Inventory and Control of Hardware Assets What is CIS Control 1? CIS Control 1 is the first control within a framework of 20 critical controls. The CIS Controls are…
What are the CIS Controls? The CIS Controls are a set of actions that protect your organization from the most pervasive cyber attacks. There are 20 total critical controls that prioritize the…
Dec
How to Create a Strong Password in 6 Easy Steps A strong password is one that is difficult to guess and easy to remember. Today it seems like the requirements for creating…
HIPAA BAA Checklist: A comprehensive checklist of everything you need to know about the HIPAA Omnibus rule, BAAs, and remaining compliant. The fines and consequences of HIPAA violations can cost you your…
21
Network Access Control (NAC) What is Network Access Control? How does Network Access Control Work? NAC capabilities Why is NAC important? Network Access Control Use Cases What is a NAC policy? What…