The next control in the Top 20 Critical Security Controls is number 11, Network Device Configurations. Much like your workstations and servers you need to maintain and control configurations for the components that drive your network. This episode goes into the details.
Be aware, be safe.
------------------------------------
Website - https://www.binaryblogger.com
Twitter - https://www.twitter.com/binaryblogger
iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2
Podcast RSS - http://securityinfive.libsyn.com/rss
YouTube - https://www.youtube.com/binaryblogger
TuneIn Radio - Security In Five Channel
Email - contactme@binaryblogger.com