Fred Cobb – CISO and VP of Services, InfoSystems
Garrett Boyd – vCIO and Security Engineer, InfoSystems
This episode of the Cybersecurity Weekly Podcast is Part 8 of our series on the Center for Internet Security Top 20 Controls. Here's a quick list of where we're at:Basic CIS Controls 1-6
Foundational CIS Controls 7) Email and Web Browser Protections
8) Malware Defenses
In this episode, Fred and Garrett discuss how you can adopt defenses to deflect Malicious Software (AKA Malware). This is the second Foundational CIS Control and is crucial for your personal and business security. The Malware Defenses control is most impactful when a company has taken action against the first six Basic CIS Controls and the first Foundational CIS Control (following the CIS Top 20 Cybersecurity Controls).
Malware (AKA Malicious Software) comes in many forms. Some of which include: Trojans, Worms, and Ransomware. Many companies don't have measures in place to prevent malware attacks. This makes company devices, servers, and networks vulnerable. Something as simple as an employee clicking a link in an email could introduce malware to your company's network. For this reason, it's important that you consider how malware can be introduced to your environment and what tools you can use to prevent it.
You can implement these controls yourself, but it may cost you a substantial amount of time, money, and effort. There are Cybersecurity experts who specialize in getting these controls set up for hundreds of organizations.
Listen to the full episode to learn how your business can begin following the Center for Internet Security Top 20 Controls and make your company more secure.More Information
We'd love to hear your feedback. If you have any questions, you can text us at 423-697-9528 or email email@example.com.
This episode discusses Control Seven of the CIS (Center for Internet Security) "Top 20 Controls." The Top 20 Controls are a set of prioritized best practices designed to help organizations protect themselves from cyber-attacks. It is a framework for every organization, whether you have a full department of IT support or don't have security programs or measures in place. You can learn more about the 20 CIS Controls here.
See the break-down of these CIS Controls' Sub-Controls here.
Discover how other organizations are using these controls here.