by meaganclry
Share

What We Look at During a CIS Review
A Visual Snapshot of How We Protect Your Organization
1. Internal Environment
Your on-prem systems and configurations are your first line of defense. We check:
-
Endpoint security (laptops, desktops, mobile devices)
-
Server hardening and patch management
-
Network segmentation and firewall rules
-
Active Directory policies & privilege management
-
Asset inventory & software tracking
-
Backup and recovery systems
Goal: Ensure the foundational controls are in place and your internal systems are locked down.
2. Cloud & SaaS Tools
Misconfigurations in cloud environments are a major risk. We assess:
-
Microsoft 365 / Google Workspace security posture
-
MFA enforcement and login auditing
-
Cloud storage access & sharing permissions
-
Shadow IT detection
-
Third-party app integrations
-
Data loss prevention (DLP) policies
Goal: Harden your cloud infrastructure and improve visibility across services you rely on.
3. Client Connections & External Access
Your clients and vendors may connect to your environment. We verify:
-
Secure remote access methods (VPNs, RDP, remote tools)
-
Vendor access control and auditability
-
Public-facing services & exposure (e.g., web portals)
-
Email security (SPF, DKIM, DMARC)
-
Phishing risk & user training programs
Goal: Minimize the risk of breaches via third parties or public interfaces.
At the End of a CIS Review, You’ll Receive:
-
A visual risk scorecard
-
Clear action plan prioritized by impact
-
Best-practice recommendations tailored to your business
STAY IN THE LOOP
Subscribe to our free newsletter.
By leveraging practical strategies and built-in tools like SharePoint’s Version History, and Google Drive’s storage manager, you can simplify your digital housekeeping and maintain an organized system all year long.
The webinar discussed how AI is a game-changer for businesses of all sizes. With the right strategy, businesses can harness AI to drive growth, streamline operations, and deliver exceptional customer experiences. Reach out to the AI Hub for tailored guidance on AI adoption and to explore upcoming training opportunities.
"The Survival Guide to a Ransomware Attack" is entirely free and requires no sign-up to download. This is an excellent resource for organizations of all sizes looking to strengthen their ransomware defenses or learn how to respond effectively if they’re attacked.
This webinar is an invaluable opportunity for SMB owners, managers, and decision-makers who are looking to make informed choices about AI investments. By attending, you will gain practical knowledge on how to leverage AI to enhance your business operations and achieve measurable results quickly.


