The recent discovery of
#DarkGate
malware delivery through Microsoft Teams opens a new exploitation pathway for malicious actors. Luckily, implementation of the CIS Microsoft 365 Foundations Benchmark v3.0.0 mitigates this threat.
#cybersecurity
#MS365
We're curious - What do YOU think will the biggest cybersecurity threat of 2018? (If you think we've missed one - reply to this poll & share your idea with us!)
CIS Controls V7.1 Introduces implementation groups which provide a simpler way to manage an organization's security improvement program.
#CISControls
#cybersecurity
#security
Kovter was the # 1 malware in December 2017 as reported by the MS-ISAC. Check out this blog post to learn about the other top 9.
#malware
#trojan
#ransomware
In our Spring 2024 issue of Cybersecurity Quarterly, we share four ways agencies can stop encrypted cyber threats. Learn more on page 6.
#cybernews
#cybersecurity
Effective cyber defense for election offices involves layers of defense at the network level, at the device level (servers and computers), at the user level, and elsewhere.
#electionintegrity
#elections
We asked our team what cybersecurity trends they think we'll see in 2020.
#DevSecOps
,
#Ransomware
, and
#5G
were just a few topics that came to mind. Have you thought about ways to deal with any of these issues in the new year?
In risk management, understanding the landscape of risks, their potential impact, and the likelihood of their occurrence is the first line of defense. Learn how FAIR's methodology revolutionizes risk analysis.
#riskanalysis
#FAIRmodel
#cybersecurity
😱 The risk of a
#cyberattack
on an enterprise is greater than ever before. Don't fret, we have you covered with IG1 of the
#CISControls
, a subset that constitutes what's known as "essential cyber hygiene" for any enterprise.
#cyberdefense
#cyberhygiene
Working from home these days? Ensure you and your team are keeping your home network secure. Check out our CIS Controls Telework and Small Office Network Security Guide.
#cybersecurity
#cyberdefense
#networksecurity
Is your operating system secure? How can you tell? Download a CIS Benchmark for
#Linux
,
#MicrosoftWindows
, or
#UNIX
to safeguard systems against today’s evolving cyber threats.
#Cloudsecurity
is becoming increasingly important. In the public cloud, there’s a shared responsibility between the Cloud Service Provider (CSP) and the user (you). Read more about where the responsibilities lie within different cloud environments.
Organizations often concentrate too much on the most publicized security threats, paying less attention to threats that fly under the radar. The June 2020 Cybersecurity Quarterly discusses prioritizing the threats that matter.
The recent discovery of
#DarkGate
malware delivery through Microsoft Teams opens a new exploitation pathway for malicious actors. Luckily, implementation of the CIS Microsoft 365 Foundations Benchmark v3.0.0 mitigates this threat.
#cybersecurity
#MS365
CIS offers dozens of hardened images via major cloud computing vendors including Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure.
Spin up a CIS Hardened Image today.
❓Do you know which devices are connected to your network and what software is installed? Multiple benefits result from having a good understanding of which devices are on your network. Get started with our five inventory worksheets on page 5.
#SME
GUIDE | How can small or medium-sized enterprises effectively respond to the continuing cyber problem? Our latest guide offers multiple recommendations to get started in securing your enterprise today.
#SME
#networksecurity
#cybersecurity
Albert is a unique network monitoring solution that provides automated alerts on both traditional and advanced network threats, allowing organizations to respond quickly when their data may be at risk. Request information and pricing today!
See how the CIS Microsoft 365 Foundational Benchmark is effective in preventing spamming, phishing, and data exfiltration attacks here.
#Cybersecurity
#Microsoft
🚨 Exciting news! You can now securely configure your Microsoft Windows 10 and 11 OSes to the CIS Benchmarks via Microsoft Intune using CIS Build Kits.
#CISBenchmarks
#configuration
#cybersecurity
CIS SecureSuite provides thousands of organizations with access to an effective and comprehensive set of cybersecurity resources and tools to implement the CIS Controls and CIS Benchmarks.
#cybersecurity
#security
Version 7.1 of the
#CISControls
completely revamp how organizations should prioritize their
#cybersecurity
activities with the introduction of Implementation Groups (IGs). Learn more from this blog post!
With the CIS Controls v8 Mapping to NIST CSF 2.0, you can better understand your cybersecurity position, evaluate your organization's cyber risk management integration, and guard against emerging cyber threats.
#CISControls
We are extremely grateful to all of those who have contributed to the success of CIS over the past 20 years, including our community volunteers and partners.
#CISis20
A strong
#cyberdefense
program is critical in protecting your organization from outside threats, and the CIS Community Defense Model 2.0 is here to help!
#cybersecurity
The EI-ISAC provides the knowledge and tools necessary to protect the infrastructure of elections against known and emerging
#cyberthreats
. Learn more and become part of our growing community today!
#cybersecurity
TikTok has shown a willingness to push narratives aligned with CCP interests within the platform. Read our latest blog from the Cyber Threat Intelligence team to learn more.
#tiktok
#tiktokban
#cti
You know that balancing your enterprise's safety and its ability to conduct business as usual is critical. Here's a way to apply just the right amount of security.
#CISControls
#cybersecurity
#security
The CIS Controls are a set of 20 prioritized actions used to beat the vast majority of the most common attacks. Download the CIS Controls today:
#cybersecurity
#cyberthreat
Data breaches can have devastating impacts on both individuals and organizations. Learn more about the impact of breaches and how you can help prevent them from security awareness training and best practices from CIS SecureSuite.
Our CIS Hardened Images of
#Windows
&
#Linux
OS are available hardened to Level 1 or Level 2 Profiles to meet various security needs. Spin up an image on major platforms today.
The global
#cybercrime
is expected to cost six trillion dollars this year, but CIS is committed to validating our standards against recognized
#cyberdefense
frameworks in the hopes to help reduce this amount in the future.
#cybersecurity
The CIS Critical Security Controls team spoke with our users and volunteers, we took that information back and used it to update our CIS Controls mappings to over 20 security frameworks. Learn more here.
#CISControls
#cybersecurity
#compliance
While public
#cloud
service providers offer protection against a number of cyber threats, the security of your data is up to you. Use CIS Hardened Images today to make sure your operating system is secure in the cloud.
#cybersecurity
Looking to tailor and deploy a custom configuration policy for an operating system that will meet your organization’s needs? Find out how you can!
#configuration
#cybersecurity
#security
There’s an old saying that “practice makes perfect.” For cyber defense, will best practices make perfect defenses? CIS Chief Evangelist Tony Sager discusses
#cybersecurity
best practices in his latest blog. Read more now.