Cyber Hygiene Matters, and So Do Definitions
BrandPost CIS

Cyber Hygiene Matters, and So Do Definitions

In an earlier article, I wrote about the importance of cyber hygiene and offered up a specific definition of basic cyber hygiene based on CIS Controls Implementation Group 1. I’d like to expand a bit on why having a clear-cut...

The Tool to Help Track and Manage Your Cybersecurity Program
BrandPost CIS

The Tool to Help Track and Manage Your Cybersecurity Program

If you‘re a cybersecurity professional, you’ve likely heard of the consensus-driven best practices known as the CIS Controls. You may have even implemented them! But to what extent? How confident are you in your implementation,...

Top Videoconferencing Attacks and Security Best Practices
BrandPost CIS

Top Videoconferencing Attacks and Security Best Practices

Videoconferencing has become a routine part of everyday life for remote workers, students, and families. Yet widespread adoption of this technology has also attracted nefarious characters whose motivations can range from simple...

How to Defend Against Today’s Top 5 Cyber Threats
BrandPost CIS

How to Defend Against Today’s Top 5 Cyber Threats

Cyber threats are constantly evolving. As recently as 2016, Trojan malware accounted for nearly 50% of all breaches. Today, they are responsible for less than 7%. That’s not to say that Trojans are any less harmful. According to...

The Journey to Better Cybersecurity in 2020 and Beyond
BrandPost CIS

The Journey to Better Cybersecurity in 2020 and Beyond

The year 2020 will be remembered as the time when widespread Internet-enabled remote working became a reality. IT administrators saw their responsibilities increase dramatically as enterprise scrambled to provide organizational...

The Resources You Need for Your Next Cybersecurity Compliance Audit
BrandPost CIS

The Resources You Need for Your Next Cybersecurity Compliance Audit

Reading a list of cybersecurity compliance frameworks is like looking at alphabet soup: NIST CSF, PCI DSS, HIPAA, FISMA, GDPR…the list goes on. It’s easy to be overwhelmed, and not only because of the acronyms. Many frameworks do...

CIS Password Policy Guide: Passphrases, Monitoring, and More
BrandPost CIS

CIS Password Policy Guide: Passphrases, Monitoring, and More

Love them or hate them, but passwords are a time-tested and imperfect method for user authentication that can protect organizations from cyber-attacks if used correctly. To be truly effective however, an organization's password...

How to Overcome the Cybersecurity Challenges of a Remote Workforce
BrandPost CIS

How to Overcome the Cybersecurity Challenges of a Remote Workforce

IT teams have spent recent months supporting staff at their organizations who work from home. Unexpected cybersecurity challenges related to patch management and new or expanded remote access vulnerabilities are two of the...

How to Improve the Cybersecurity Compliance Process
BrandPost CIS

How to Improve the Cybersecurity Compliance Process

Does your organization struggle to prepare for cybersecurity audits, sometimes juggling multiple requirements? If so, you're not alone. The Center for Internet Security takes a collaborative approach to compliance by developing...

Shared Responsibility for Cloud Security: What You Need to Know
BrandPost CIS

Shared Responsibility for Cloud Security: What You Need to Know

The COVID-19 pandemic changed business practices worldwide. The traditional workplace transformed; for many, the “new norm” is now a home office and a virtual workplace with employees holding meetings via video teleconferencing...

Center for Internet Security's Community Defense Model
BrandPost CIS

Center for Internet Security's Community Defense Model

The CIS Critical Security Controls (CIS Controls) are a set of more than 170 cybersecurity defensive measures, called safeguards, organized into a set of 20 Control activities. A community of security experts cooperate to keep...

Cleaning Up a Definition of Basic Cyber Hygiene
BrandPost CIS

Cleaning Up a Definition of Basic Cyber Hygiene

In discussions about cyber defense, we often hear the term “cyber hygiene.” The general notion is that a lack of good cyber hygiene is at the heart of most cyber-attacks. The phrase plays off of commonly accepted ideas in personal...

Load More
Top Blog Posts