20 for 2020: Security Decay

(Secure Configuration of Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers)

Originally from David’s Linkedin:

Ch 5 of Tetra Defense‘s 20for2020: “Security Decay”

Today we tackle the Center for Internet Security‘s fifth control, the ‘Secure Configuration of Hardware & Software on Mobile Devices, Laptops, Workstations, and Servers.’

Informationsecurity is a moving target, but it’s one you can hit if you start out right.

The makers of hardware & software produce tools that are designed to be quick & easy to use right out of the box. But quick & easy don’t always (rarely, actually) equal security.

Your cybersecurity team should be researching the best ways to implement secure configurations on all of your devices, and then continuously monitor reputable sources to ensure that the security they’ve implemented doesn’t grow stale.

Check out the rest of the 20 for 2020 video series: