How secure configurations meet consensus

The CIS Benchmarks are used by companies from around the world to secure technologies from configuration vulnerabilities such as: Open system ports Unauthorized root or admin access User account control (UAC) Unnecessary/unused system services Server Message Block (SMB v1.0) These vulnerabilities are often open doors for malware that can cause serious damage.

Read full article on Help Net Security

 


Date:

Categorie(s):