The Top 20 Critical Security Controls for Effective Cyber Defense

With data breaches increasing, more than ever organizations have to ensure that they have all necessary security controls in place to keep their data safe. As a response to growing security threats, the SANS Institute, together with the Center for Internet Security (CIS) and other organizations, developed the 20 Critical Security Controls (CSC) for Effective Cyber Defense. The CIS CSC provides IT pros with a prioritized, focused set of actions to help them stop the most dangerous cyber attacks and ensure data security.

Continue reading to view the 20 controls in the CIS CSC and why each of them is critical, and then 5 steps for implementing the controls in a pragmatic way.

Continue Reading…
  •  
  •  
  •  
  •  
  •  
  •  

Hackers Are Now Exploiting Zoom’s Spike in Usage to Spread Malware

As people increasingly work from home and online communication platforms such as Zoom explode in popularity in the wake of coronavirus outbreak, cybercriminals are taking advantage of the spike in usage by registering new fake “Zoom” domains and malicious “Zoom” executable files in an attempt to trick people into downloading malware on their devices.

Continue Reading…
  •  
  •  
  •  
  •  
  •  
  •