,

CSW S1, E31 - How to Secure Your Wireless Access

Fred Cobb – CISO and VP of Services, InfoSystems

Tim Morton – Technical Team Lead of Engineering Services, InfoSystems

This episode of the Cybersecurity Weekly Podcast is Part 15 of our series on the Center for Internet Security Top 20 Controls. Here's a quick list of where we're at:

Basic CIS Controls 1-6
Foundational CIS Controls
7. Email and Web Browser Protections
8. Malware Defenses
9. Limitation and Control of Network Ports, Protocols, and Services
10. Data Recovery Capability
11. Secure Configuration for Network Devices, such as Firewalls, Routers and Switches
12. Boundary Defense
13. Data Protection
14. Controlled Access Based on the "Need to Know"
15. Wireless Access Control 

In this episode, Fred and Tim discuss the ninth Foundational CIS Control, Wireless Access Control. This control is used to track, control, prevent, and correct the way you use your wireless local area networks, access points, and wireless client systems. Wireless Access Control is most impactful when a company has taken action against the first 14 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

No company or individual wants their wireless network(s) to be exploited. After all, it's where a large portion of communication and business gets done. Not to mention a wireless network is a gateway to other important systems and applications. This episode discusses steps you can take today to ensure your wireless networks are more secure. Some of these steps are as simple as limiting guest wi-fi access and limiting your wireless signal strength.

You can implement these CIS controls yourself, but it may cost you a substantial amount of time, money, and effort. There are Cybersecurity experts who specialize in getting these controls set up for hundreds of organizations.

Listen to the full episode to learn how your business can begin following the Center for Internet Security Top 20 Controls and make your company more secure.

More Information

We'd love to hear your feedback. If you have any questions, you can text us at 423-697-9528 or email marketing@infosystems.biz.

This episode discusses Control Ten of the CIS (Center for Internet Security) "Top 20 Controls." The Top 20 Controls are a set of prioritized best practices designed to help organizations protect themselves from cyber-attacks. It is a framework for every organization, whether you have a full department of IT support or don't have security programs or measures in place. You can learn more about the 20 CIS Controls here.

See the break-down of these CIS Controls' Sub-Controls here.

Discover how other organizations are using these controls here.

Download the CIS Controls for more details on implementing this and the other 19  Controls here.