A lot of security experts talk about threat hunting, packet analysis and pen testing. Can you do effective threat hunting? Are you able to analyze packets and spot the bad guy? For most people in IT, the answer to these questions is a big fat no. We’re here to tell you that security doesn’t need to be this hard or complex. It doesn’t have to be rocket science. We talk about some best practices that can make security a little easier.

LINKS

  1. The CIS Controls: https://www.cisecurity.org/controls/
  2. NIST – Small Business Information Security: https://csrc.nist.gov/publications/detail/nistir/7621/rev-1/final
  3. CIS Implementation Guide: https://www.cisecurity.org/white-papers/cis-controls-sme-guide/