Aug 24, 2022CYBERSECURITY GRCCybersecurity Control Review - Use DHCP Logging to Update Asset Inventories, CIS 1.4Configure DHCP logging on all DHCP servers or leverage IP address management tools to review and update the company's asset inventory.
Aug 22, 2022CYBERSECURITY GRCCybersecurity Control Review - Utilize an Active Discovery Tool, CIS 1.3Utilize an active discovery tool to detect and identify assets/devices connected to the company's network that are unauthorized to do so.
Aug 20, 2022CYBERSECURITY GRCCybersecurity Control Review - Address Unauthorized Assets, CIS 1.2Address unauthorized assets that are detected on the company network or connecting to company resources, which is part of CIS Control 01.
Aug 16, 2022CYBERSECURITY GUIDESImplementing Cybersecurity architectures across Microsoft servicesOne of the most important features within Microsoft 365 that should absolutely be leveraged to improve security is Conditional Access.
Aug 15, 2022CYBERSECURITY GRCCybersecurity Control Review - Manage and Maintain an Asset Inventory, CIS 1.1Daily Security Control - Today we cover CIS Control 1.1, Manage and Maintain an Asset Inventory.