IT Cause Analysis Methodology

Cause analysis is often referred to as Root Cause Analysis and is the method of identifying the source of a problem. This method of discovering the source of why something has occurred is detailed here. Root Cause analysis varies slightly when dealing with IT-based issues. We will include IT-based thinking and methods in this document.…

Details

Endpoint System Compliance Scanning

You have a great firewall, and it provides you VPN tunnels, your users enjoy connecting to your critical information from their home computers or BYOD devices all day. So how were you crippled by Ransomware when you have EDR, IPS, IDS and every other security device running on your network? It is because you did…

Details

What Does Cloud Security Involve?

Whether it’s in the news, online articles or elsewhere, chances are you’ve heard a lot about cloud business solutions. Particularly, cloud security gets a lot of attention because of the issues surrounding cyber security across the world. While cloud security began as a controversial topic of discussion, those conversations have shifted dramatically to the point…

Details

Nist 800 -171 3.1.12

Monitor and control remote access sessions. This control is about how endpoints connect to your network and how you deal with them. The first way is to have a VPN (Virtual Private Network) encrypts access to your network and since you have limited access in previous controls to cut to authorized individuals, those people should…

Details

NIST 800 -171 3.1.11

Terminate (automatically) a user session after a defined condition. The object of this control is to end a user session after a timeout period. This can be done again by using the GPO, Group Policy Object capabilities in windows. You can also leverage your other products that have timeout features to accomplish this goal. Most…

Details