Episode 29 – CIS 3 Secure Configurations

Next up in the CSCX Top 20 is number three, Secure Configurations. After you get your hardware and software inventories you need to ensure they are configured properly and consistently. This episode breaks it down.

Be aware, be safe.

Music in this episode:
Starchild by Mystery Mammal is licensed under a Attribution-ShareAlike License.

Check out this episode!

Please follow and like us:
Pin Share

Become a Patron!

Follow me on Twitter


Member of The Internet Defense League

Enjoy this blog? Please spread the word :)

Follow by Email