• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Cyber Security Solutions, Compliance, and Consulting Services - IT Security

We offer It security management, data, network, & Information security services for protecting information & mitigating security risks to your organization.

  • Home
  • About Us
  • Solutions & Services
    • Security Governance
    • NETWORK SECURITY
    • CLOUD SECURITY
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

The four CIS controls you should implement first

By kamran | At September 21, 2019

Sep 21 2019

The four CIS controls you should implement first

CIS Critical Security Controls is a non-profit computer security organization that has been around decades. It is well-known for publishing their operating system best-practice security recommendations and benchmarks. The senior vice president of CIS is famous for the fog of more lecture series, and he argues that information overload is the main problems against better computer security.

For better cybersecurity, an organization should implement all the CIS top 20 controls. These controls have everything a computer security program should have. To have them a firm should start with these four top controls

  • Implement a security awareness and training program
  • Continuous vulnerability management
  • Controlled use of administrative privileges
  • Maintenance, monitoring, and analysis of audit logs

Implement a security awareness and training program

It was concluded that 90% of malicious data breaches occur because of phishing and social engineering. One can use different types of products such as firewalls, anti-malware, anti-spam, anti-phishing, and training to avoid them.

Besides using these products, some of the phishing can still get through to the end-user. So it is vital to train the end-users on how to recognize maliciousness and what to do once they recognize it. The training and awareness program should be provided multiple times within a year.

Continuous vulnerability management

More than 30 % of the data breaches occur due to Unpatched software. It is the second most frequent reason for data breaches. It is vital to automate patching as much as it is possible besides scanning your environment for vulnerabilities and missing patches.

Client-side vulnerabilities come with browsers and browsers add-in which are followed by the operating system holes. Whereas on the server-sides, vulnerabilities come with the webserver software, databases, and server management.

Controlled use of administrative privileges

To have a secure system, an organization should minimize the numbers of admin accounts and should use high-security products to protect the admin accounts. They should minimize the number of members of any elevated group and should use multi-factor authentication login. Keeping the time limit on the checkout is also important.

Maintenance, monitoring, and analysis of audit logs

Another reason for data breaches is weak security login. An organization should adopt two-factor authentication for better security. Security information event management also helps to improve security. An organization should modify and train the system to minimize false positives and false negatives.

Written by kamran · Categorized: Cyber security tips

Primary Sidebar

Recents post

Your Law Firm Could Be Next — Are You Protected?

Cybercriminals are targeting … [Read More...] about Your Law Firm Could Be Next — Are You Protected?

Litigation, Logins, Breach Response & More: A Lawyer’s Cyber Survival Guide

Your clients trust you with … [Read More...] about Litigation, Logins, Breach Response & More: A Lawyer’s Cyber Survival Guide

Massive Surge in Healthcare Cyber Attacks…Ransomware, Radiology Data Breach, and More

The first half of 2025 has … [Read More...] about Massive Surge in Healthcare Cyber Attacks…Ransomware, Radiology Data Breach, and More

Categories

  • AI and cybersecurity (2)
  • blockchain (1)
  • Cloud security (29)
  • Compliance (25)
  • Cyber security news (108)
  • Cyber security threats (376)
  • Cyber security tips (370)
  • Data Security (3)
  • E-Commerce cyber security (3)
  • Education cyber security (1)
  • Enterprise cyber security (7)
  • Financial organizations cyber security (4)
  • General (22)
  • Government cyber security (4)
  • Healthcare cyber security (19)
  • Information Security (2)
  • Law Firms Cyber Security (9)
  • Network security (9)
  • Newsletter (1)
  • Privacy (1)
  • Ransomware (14)
  • remote work (1)
  • Risk assessment and management (6)
  • Security management and governance (9)
  • SME Cybersecurity (2)
  • Software Security (2)
  • Supply Chain Attacks (5)
  • System security (3)
  • Uncategorized (35)
  • Vendor security (14)

Archives

Footer

Infoguard Cyber Security

San Jose Office
333 W. Santa Clara Street
Suite 920
San Jose, CA 95113
Ph: (855) 444-6004

Irvine Office
19800 MacArthur Blvd.
Suite 300
Irvine, CA 92612

Recent Posts

  • Your Law Firm Could Be Next — Are You Protected?
  • Litigation, Logins, Breach Response & More: A Lawyer’s Cyber Survival Guide
  • Massive Surge in Healthcare Cyber Attacks…Ransomware, Radiology Data Breach, and More

Get Social

  • LinkedIn
  • Home
  • About Us
  • Solutions & Services
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

Privacy Policy Terms of Use Acceptable Use

Copyright © 2025 | All right reserved