NCSI | NEWS

NCSI News

The latest news and information from NCSI

Recent NCSI News Articles

Steven Taylor Joins Network Consulting Services, Inc. as Service and Delivery Manager

For Release:  September 11, 2017 Bountiful, Utah— September 11, 2017 — Network Consulting Services, Inc. (NCSi) today announced Steven Taylor will be joining NCSi in a newly created position, as Service and Delivery Manager, reporting to Brian Hoskins, Director of...

Ivanti Security Software: Our Cyber Threat-Killing Toolkit

Ivanti rocks. Enforcing the first five CIS Critical Security Controls in your organization’s network reduces the threat of cyberattack by 85%. And Ivanti is the only suite of tools that addresses all of the first five controls.  Plus, it adds control number 15 for...

Imperva Named Leader in 2017 Gartner Magic Quadrant for Web Application Firewalls for the 4th Consecutive Year

REDWOOD SHORES, Calif.–(BUSINESS WIRE)–Imperva, Inc. (NASDAQ: IMPV), committed to protecting business-critical data and applications in the cloud and on-premises, today announced that it has been named a leader in the Gartner Magic Quadrant for Web...

Securing Your Data & Addressing 11 CIS Critical Security Controls with Imperva

Imperva protects websites, applications, and databases wherever you deploy them.  NCSi engineers leverage the Imperva suite because it is an effective tool in securing your data from attack.  Here’s why Imperva is in our quiver of tools:   CIS Security...

How Forcepoint Tackles The Critical IT Security Controls

In our continuing series on the 20 CIS Critical Security Controls, we turn to the tools that mitigate the daily attacks threatening your networks and data.   Be sure to download a copy of our NCSi Security Controls plan. You’ll find each of the 20 Security...

How to implement the first 5 CIS Security Controls and reduce your cyberattack risk by 85%

As we said in our first article on this series, implementing the first five of 20 Security Controls reduces your risk of cyberattack by 85%.  Implementing all 20 Security Controls reduces the risk of cyberattack by 94% – a lofty goal indeed. We leverage a wide...

Close the Window: How to Minimize Attacks with Continuous Vulnerability Assessment & Remediation (Control #4)

Let’s start right out with our fourth CIS Critical Security Control definition. Due to the wording, it takes a moment for it to sink in. CIS Control #4:  Continuous Vulnerability Assessment and Remediation Continuously acquire, assess, and take action on new...

Achieving Flawless Backup Availability with Veeam

The digital world is never asleep. Customers expect businesses to respond to their requests around the clock.  Users require their data to be accessible at any time, and employees are unable to do their jobs without stable, always-on information technology...

Becoming an Internal Trusted Business Partner Within Your Organization

Becoming an Internal Trusted Business Partner Within Your Organization IT groups who have utilized ITIL framework to help with operational efficiencies have become much more effective in the overall business objectives. The success in coupling the overarching...

Exerting Critical Control With Secure Configurations – CIS Critical Security Control 3

Hardware and Software Everywhere At times, it doesn’t seem possible to count all the individual pieces of hardware and software in your world.  But every piece of the IT puzzle must be tracked, reported, and corrected if found to be out of alignment with today’s...