Fred Cobb – CISO and VP of Services, InfoSystems
Chad Waddell – Sr. Security Architect, InfoSystems
In this episode, Fred and Chad discuss Hardware Assets, or in other words, the technology devices your company owns. Learn why your company needs to keep an inventory of hardware assets, how to get control of hardware assets, and tools that can help you do both of the above.
Many companies don't know how many technology devices they actually own and struggle to keep track of where the items are or who uses them.
Have you ever let someone borrow something from you and then looked for it months later forgetting who borrowed it, when, and what you agreed to? This creates major security concerns. Not to mention, older or unused devices that go missing may have nobody looking for them. For this reason, it's necessary that your company knows how many devices there are, what they are used for, and who is using them.
There are a number of tools any company can use to help take over device inventory. One such tool, Spiceworks, is a free platform. A similar tool, Lansweeper, is a paid platform. Both of these tools actively seek to save you time, money, and resources. And to create a more secure environment. There is an abundance of other tools and resources available to you for help in taking and gaining control of your device inventory.
Listen to the full episode to learn how your business can begin securing, controlling, and taking inventory of your hardware assets.More Information
We'd love to hear your feedback. If you have any questions, you can text us at 423-697-9528 or email email@example.com.
This episode discusses Control One of the CIS (Center for Internet Security) "Top 20 Controls." The Top 20 Controls are a set of prioritized best practices designed to help organizations protect themselves from cyber-attacks. It is a framework for every organization, whether you have a full department of IT support or don't have security programs or measures in place. You can learn more about the 20 CIS Controls here.