Blog

CIS Controls- The Basics Your Business Should be Following

CIS Controls
Blog

CIS Controls- The Basics Your Business Should be Following

CIS Controls: The Basics Your Business Should be Following – YouTube

What are CIS Controls and how can your business use these best practices to defend themselves against the most common and important attacks.

While most frameworks list all the things organizations should do to improve their security, the CIS Controls tell you what is critical to do, and more importantly, how to do it. They translate cyber threat information into action, giving enterprises an executable plan to defend themselves against the most common and important attacks. CIS offers free resources to municipalities and the controls are free for small businesses.

Throughout this video, our Cybersecurity experts, Cody Tyler and Cam Murphy, go through the important CIS Controls during a Cybersecurity Conference with the Indiana Chamber. Though there are 18, we reduce the CIS controls to those that matter most to small and midsize companies including:

  • Email and Web Browser Protections
  • Malware Defenses
  • Limitation and Control of Network Ports, Protocols and Services
  • Data Recovery Capabilities
  • Secure Configuration for Network Devices such as Firewalls, Routers and Switches
  • Boundary Defense
  • Data Protection
  • Controlled Access Based on the Need to Know
  • Wireless Access Control
  • Account Monitoring and Control

Though each control, we give an overview, why it matters, and how it works.

Leave your thought here

Your email address will not be published. Required fields are marked *