Wyman 2
given situation to senior management we would need to detail the information into terms that can be relatable to the staff and not just those trained within the IT fields. This scenario could be best described as a break-
in at the store using this example will allow the management to understand the situation they are facing. By using terms and examples that are more relatable to other non-IT employees we are able to deal with the situation in a timely manner instead of spending more time just trying to explain the IT terminology of it all. When looking over this breach there are two CIS controls that I would suggest in implementing. These CIS controls are CIS control 6 and CIS control
10. I chose these two controls because CIS control 6 is an access control management where as CIS control 10 concerns the use for malware and ransomware technology. CIS control 6 is a critical component when it comes to maintaining information and system security as well as restricting the access to assets based on their role and need. This alone would allow for a greater security control over information and restricts the number of users that are able to destroy or simply corrupt sensitive information. With the addition of CIS control 10 we are able to have something that would
lay out the minimum requirements when it comes to security to ensure the companies malware defenses are up to the job. In today’s world implementing and maintaining any form of malware protection is essential for any business’s technology outlook. All businesses could fall victim to