NIST 800 -171 3.1.10

Use session lock with pattern-hiding displays to prevent access/viewing of data after a period of inactivity. You can control when a screen saver will pop up with the Global Policies Object in windows. You will need to use GPO’s later so start getting used to setting up GPO’s for specific controls. You need to set…

Sales Methodology

So you think you are good at sales? Do you say you can sell fire to the Devil or ice to Eskimos? Sure maybe you have a great personality, you shoot from the hip and a majority of the time you have no problems getting a meeting, maybe you pitch your product, maybe potential customers…

White label soc services

Endpoint Detection and Response (EDR) is More Important Than You Think

Endpoint security is confusing for business owners at times since the benefits aren’t immediately clear. While it is a network security tool, it’s different than traditional antivirus software, firewalls and other related security tools. Most SOC service providers offer endpoint detection and response (EDR) as part of their standard security services since it’s an important…

it consulting services

The Importance of Intrusion Detection and Prevention Services

Intrusion detection and intrusion prevention services are both designed to identify threats to a network. The more sophisticated cyber criminals become, the more IT security tools companies need to have. Sometimes working with IT consulting services can help you identify exactly what would be beneficial for your network infrastructure based on the layout, risks, budget…

Working Sessions

Meetings, some of us are plagued by them, we have too many back to back meetings in a day to accomplish anything. Some meetings your contribution is limited or very small, and some meetings your part is the center of the entire meeting. In my personal experience and through my vast experience with attending meetings,…

NIST 800 -171 3.1.7

Prevent non-privileged users from executing privileged functions and audit the execution of such functions. Here is where the separation of admin accounts and non-admin accounts helps you with this control. Don’t allow the non-admin accounts to have any access or ability to perform any commands that a privileged account will create. If you follow the…

NIST 800 – 171 3.1.6

Use non-privileged accounts or roles when accessing nonsecurity functions. The object of this control is to set up an admin-account and a non-admin-account for privileged access and no-privileged access. This control seeks to separate admin accounts from non-admin accounts and what actions are performed by each. The best way to go about this is to…