If you’re looking for a no-nonsense, action-ready set of security best practices, the CIS Controls are a fantastic place to start. Developed by the Center for Internet Security, this framework strips away the fluff and focuses on what really matters when protecting your IT environment.
At 101 IT, we love how practical and tactical these controls are. Whether you’re a growing business or an enterprise, the CIS Controls provide a clear, prioritized roadmap to cybersecurity.
Let’s unpack why this framework is so widely used—and how you can apply it to your business today.
What Are CIS Controls?
The CIS Controls (formerly known as the SANS Top 20) are a set of 18 prioritized actions designed to help organizations prevent the most common and dangerous cyberattacks.
What makes them different?
The Three Implementation Groups (IGs)
CIS Controls are divided into Implementation Groups (IG1, IG2, IG3) based on your organization’s size, risk level, and available resources:
This tiered approach means even small businesses can get started without feeling overwhelmed.
What the 18 CIS Controls Cover
The Controls span across core security areas, including:
You don’t have to implement all 18 at once. Start with the basics and grow from there.
How 101 IT Helps You Implement CIS Controls
Many businesses we work with want something that works without needing a PhD in cybersecurity. That’s where the CIS Controls shine—and we help you bring them to life.
Our approach includes:
Real-World Example
A regional accounting firm came to us after experiencing a phishing attack. They didn’t have structured controls in place.
We helped them implement IG1 controls like secure email gateways, multi-factor authentication, and endpoint protection—all part of CIS Controls. Within weeks, their risk posture improved significantly, and they could demonstrate cybersecurity due diligence to their clients.
Final Thoughts
The CIS Controls are like a playbook for cyber defense: simple, direct, and powerful.
At 101 IT, we’re here to help you take that playbook and make it your own. No stress, no tech jargon—just clear steps to a more secure business.
Want to start building a stronger foundation for your cybersecurity? Let’s connect.
Ready to elevate your IT? Whether you're in the Greater Toronto Area (GTA), Ontario, or anywhere across Canada, we’re here to help your business grow and thrive. Let’s start the conversation today!