20 Critical Security Controls: Control 7 – Email and Web Browser Protections

Today, I will be going over Control 7 from version 7 of the CIS top 20 Critical Security Controls – Email and Web Browser Protections. I will go through the 10 requirements and offer my thoughts on what I’ve found. Key Takeaways for Control… Continue reading 20 Critical Security Controls: Control 7 – Email and Web Browser Protections

20 Critical Security Controls: Control 8 – Malware Defenses

Today, I will be going over Control 8 from version 7 of the CIS top 20 Critical Security Controls – Malware Defenses. I will go through the eight requirements and offer my thoughts on what I’ve found. Key Takeaways for Control 8 Back to the… Continue reading 20 Critical Security Controls: Control 8 – Malware Defenses

20 Critical Security Controls: Control 9 – Limitation and Control of Network Ports, Protocols, and Services

Today, I will be going over Control 9 from version 7 of the CIS top 20 Critical Security Controls – Limitation and Control of Network Ports, Protocols, and Services. I will go through the five requirements and offer my thoughts on what I’ve… Continue reading 20 Critical Security Controls: Control 9 – Limitation and Control of Network Ports, Protocols, and Services

20 Critical Security Controls: Control 10 – Data Recovery Capabilities

Today, I will be going over Control 10 from version 7 of the CIS top 20 Critical Security Controls – Data Recovery Capabilities. I will go through the five requirements and offer my thoughts on what I’ve found. Key Takeaways for Control 10 … Continue reading 20 Critical Security Controls: Control 10 – Data Recovery Capabilities

20 Critical Security Controls: Control 11 – Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches

Today, I will be going over Control 11 from version 7 of the CIS top 20 Critical Security Controls – Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches. I will go through the seven requirements and offer my thought… Continue reading 20 Critical Security Controls: Control 11 – Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches

20 Critical Security Controls: Control 12 – Boundary Defense

Today, I will be going over Control 12 from version 7 of the CIS top 20 Critical Security Controls – Boundary Defense. I will go through the 12 requirements and offer my thoughts on what I’ve found. Key Takeaways from Control 12 Quick and p… Continue reading 20 Critical Security Controls: Control 12 – Boundary Defense

20 Critical Security Controls: Control 13 – Data Protection

Today, I will be going over Control 13 from version 7 of the CIS top 20 Critical Security Controls – Data Protection. I will go through the nine requirements and offer my thoughts on what I’ve found. Key Takeaways for Control 13 A wide arra… Continue reading 20 Critical Security Controls: Control 13 – Data Protection

20 Critical Security Controls: Control 14 – Controlled Access Based on the Need to Know

Today, I will be going over Control 14 from version 7 of the CIS top 20 Critical Security Controls – Controlled Access Based on the Need to Know. I will go through the nine requirements and offer my thoughts on what I’ve found. Key Takeaway… Continue reading 20 Critical Security Controls: Control 14 – Controlled Access Based on the Need to Know

20 Critical Security Controls: Control 15 – Wireless Access Control

Today, I will be going over Control 15 from version 7 of the CIS top 20 Critical Security Controls – Wireless Access Control. I will go through the ten requirements and offer my thoughts on what I’ve found. Key Takeaways for Control 15 Redu… Continue reading 20 Critical Security Controls: Control 15 – Wireless Access Control