Small to midsized businesses (SMBs) are suffering their fair share of digital attacks. CNBC reported that threat actors were targeting SMBs almost half (43%) of the time. These attack efforts ...
We know that good “hygiene” is conducive to good health and cleanliness. And, if you’re reading this blog it’s safe to say that you’re familiar with the term “cyber” as it relates to computers and ...
The CIS Critical Security Controls list (formerly the SANS Top 20 controls) has been the gold standard for security defense advice. These are the tasks you should do first. Implementing security ...
‘I don’t care which [security framework] you pick, but pick one. Don’t try and build your own. Don’t say “We’re like a combo of NIST and ISO and we use a little bit of CIS.” That does not work. You ...
We have entered the era of multiple security frameworks. Sometimes mandatory, often voluntary, security frameworks are created to provide federal and commercial organizations with an effective roadmap ...
CMC Telecom becomes a Services & Consulting Member of the Center for Internet Security, marking a strategic move to embed global cybersecurity standards into Vietnam’s digital infrastructure. As cyber ...