Skip to content

Understanding CIS Controls: A Blueprint for Cyber Defense

Menu Home Our Services Artificial Intelligence (AI) Automation Solutions Custom IT Solutions Cybersecurity Managed IT Services (MSP) About Us Blog Contact Us Back to Blog Understanding CIS Controls: A Blueprint for Cyber Defense If you’re looking for a no-nonsense, action-ready set of security best practices, the CIS Controls are a fantastic place to start. Developed by the Center for Internet Security, this framework strips away the fluff and focuses on what really matters when protecting your IT environment. At 101 IT, we love how practical and tactical these controls are. Whether you’re a growing business or an enterprise, the CIS Controls provide a clear, prioritized roadmap to cybersecurity. Let’s unpack why this framework is so widely used—and how you can apply it to your business today.   What Are CIS Controls? The CIS Controls (formerly known as the SANS Top 20) are a set of 18 prioritized actions designed to help organizations prevent the most common and dangerous cyberattacks. What makes them different? They’re prescriptive – Not just “what,” but “how.” They’re ranked by importance – So you can focus on what matters most first. They’re updated regularly – The latest version (V8) reflects today’s threat landscape.   The Three Implementation Groups (IGs) CIS Controls are divided into Implementation Groups (IG1, IG2, IG3) based on your organization’s size, risk level, and available resources: IG1: Basic cyber hygiene for small organizations. IG2: More advanced controls for mid-sized companies. IG3: Robust protection for high-risk, large enterprises. This tiered approach means even small businesses can get started without feeling overwhelmed.   What the 18 CIS Controls Cover The Controls span across core security areas, including: Inventory and Control of Assets Secure Configuration Continuous Vulnerability Management Controlled Use of Admin Privileges Account Monitoring Data Protection Email and Web Browser Protections Malware Defenses Limiting and Controlling Network Ports Data Recovery Capabilities Secure Configuration for Network Devices Boundary Defense Security Awareness Training Application Software Security Incident Response Penetration Testing Security Skills Assessment Service Provider Management You don’t have to implement all 18 at once. Start with the basics and grow from there.   How 101 IT Helps You Implement CIS Controls Many businesses we work with want something that works without needing a PhD in cybersecurity. That’s where the CIS Controls shine—and we help you bring them to life. Our approach includes: Initial Assessment: Which controls are already in place, and which need attention? Roadmap Creation: Prioritized implementation based on your IG level. Tool Selection & Configuration: We recommend tools aligned with your goals and budget. Ongoing Monitoring: Controls don’t mean much if they’re not maintained. Training & Awareness: Empowering your team to understand and use these controls effectively.   Real-World Example A regional accounting firm came to us after experiencing a phishing attack. They didn’t have structured controls in place. We helped them implement IG1 controls like secure email gateways, multi-factor authentication, and endpoint protection—all part of CIS Controls. Within weeks, their risk posture improved significantly, and they could demonstrate cybersecurity due diligence to their clients.   Final Thoughts The CIS Controls are like a playbook for cyber defense: simple, direct, and powerful. At 101 IT, we’re here to help you take that playbook and make it your own. No stress, no tech jargon—just clear steps to a more secure business. Want to start building a stronger foundation for your cybersecurity? Let’s connect. June 18, 2025 Enjoyed this article? Share it with your network! Get in Touch with Us Ready to elevate your IT? Whether you’re in the Greater Toronto Area (GTA), Ontario, or anywhere across Canada, we’re here to help your business grow and thrive. Let’s start the conversation today! Contact Us Today Copyright © | Powered by

What on Earth Is a Security Framework (and Why Should You Care)?

Menu Home Our Services Artificial Intelligence (AI) Automation Solutions Custom IT Solutions Cybersecurity Managed IT Services (MSP) About Us Blog Contact Us Back to Blog What on Earth Is a Security Framework (and Why Should You Care)? Let me be honest with you: the first time I heard the term security framework, I instantly thought it sounded like something meant for massive corporations, government agencies, or tech teams with 300 people and a spaceship-sized budget. Definitely not something a small business like mine — or most of my clients — needed to worry about. Turns out, I was wrong. But not in the scary way I expected. Because once you break it down, a security framework isn’t something to fear. In fact, if you’re a business owner, IT consultant, MSP, or just trying to keep your company’s digital stuff safe, a framework might just be the easiest way to make sure you’re not missing something really important. So, let’s talk about what a security framework actually is — in real language — and how it can work for you, not just for Fortune 500s with their own data centers and legal teams.   So… What Exactly Is a Security Framework? A security framework is basically a structured set of guidelines, best practices, and policies that help you manage your cybersecurity risks. Think of it like a recipe or a building plan — it tells you what ingredients (or controls) you need, the order to put them in, and why they matter. It helps answer questions like: “What should I secure first?” “How do I know if my systems are vulnerable?” “What if something goes wrong — do I have a plan?” “Am I doing what I should be doing?” If you’ve ever sat at your desk thinking, “Ugh, I don’t even know where to start with cybersecurity,” — well, congratulations. You’re officially the perfect candidate for using a framework. And here’s the kicker: you don’t need to follow one perfectly. Frameworks are flexible, adaptable, and meant to meet you where you are — whether that’s a one-person business or a scaling MSP with growing responsibilities.   Why Should You Bother With One? Here’s the thing. Cybersecurity isn’t just about avoiding hackers and locking down your Wi-Fi anymore. It’s about: Protecting your customers’ trust Keeping your data (and your reputation) intact Avoiding fines, breaches, and embarrassing phone calls to clients Being able to sleep at night, knowing you’re covered A security framework helps you focus on what matters most without getting lost in the noise. And for me, that’s everything. Most people — especially small business owners — don’t have time to dig through thousands of pages of compliance laws or technical manuals. A good framework turns that overwhelming mountain of information into a manageable roadmap. So instead of thinking, “I have no idea what to do,” you’re thinking, “Here’s what I’m doing next.” Some Common Frameworks You’ll Hear About (and Why They’re Not So Scary) Let’s go over a few of the most popular security frameworks you’ll probably hear people throw around in conversation, compliance docs, or LinkedIn threads: 1. NIST Cybersecurity Framework (CSF) NIST stands for the National Institute of Standards and Technology — a U.S. agency that builds super practical guidelines for all things security. Their Cybersecurity Framework is built around five major functions: Identify – Know what you have, what’s valuable, and where your risks are Protect – Put controls in place to reduce risk Detect – Monitor for threats and unusual activity Respond – Have a plan when something goes wrong Recover – Restore operations and learn from incidents This is one of my favorites because it’s comprehensive but super flexible. It works for businesses of all sizes. 2. ISO/IEC 27001 This is a globally recognized standard for information security management. It’s a bit heavier on documentation and process, but that’s not a bad thing. It focuses on: Defining a risk-based information security management system (ISMS) Implementing security policies, roles, and ongoing improvements Demonstrating accountability and compliance (often for audits or certifications) If you’re working with partners in Europe or need formal certifications, this one is a great investment. 3. CIS Controls These are maintained by the Center for Internet Security and are often seen as the most actionable set of controls. They offer a prioritized checklist of practical steps you can take to improve your security posture. Think of it like “Cyber Hygiene 101”: Inventory your assets Patch your systems Set up proper access controls Enable multi-factor authentication (MFA) For small businesses or folks just getting started, CIS is one of the easiest ways to get early wins. But Which One Should I Actually Use? Ahhh, the classic question. And here’s my honest answer: it depends. Here’s how I think about it when advising clients: Business Type Best Fit Framework Why? Solo Consultant or Startup CIS Controls Simple, quick wins, low overhead Scaling MSP NIST or CIS Flexibility with room to grow Serving Regulated Industries (e.g. healthcare, finance) ISO 27001 + Compliance Frameworks (HIPAA, PCI, etc.) Documentation, audits, certification needs International Growth Plans ISO 27001 Recognized worldwide, great for scaling Working with government contracts NIST CSF or NIST 800-171 Often required or expected by partners   Still stuck? Start with CIS Controls. You’ll learn fast, build confidence, and avoid over-engineering your security setup too early. How to Get Started Without Losing Your Mind Let me tell you a secret: you don’t need to implement an entire framework overnight. In fact, please don’t. Instead, try this: Assess your current state – What do you already have in place? Where are the gaps? Pick a framework that fits your industry, size, and risk tolerance Prioritize 3–5 controls or areas to focus on for the next 90 days Build momentum, not perfection Review quarterly — security is never “done,” but it gets easier over time And please — document what you’re doing. Even if it’s a shared Google Doc. It shows intent, and that matters.   Real Talk … Read more