Episode 29 – CIS 3 Secure Configurations

Next up in the CSCX Top 20 is number three, Secure Configurations. After you get your hardware and software inventories you need to ensure they are configured properly and consistently. This episode breaks it down.

Be aware, be safe.

————————————
Music in this episode:
Starchild by Mystery Mammal is licensed under a Attribution-ShareAlike License.

Check out this episode!


Become a Patron!

Sign-Up: Free Security Training