{"id":68054,"date":"2025-07-30T11:39:32","date_gmt":"2025-07-30T16:39:32","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=68054"},"modified":"2025-07-30T11:39:33","modified_gmt":"2025-07-30T16:39:33","slug":"elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/","title":{"rendered":"Elevating Cyber Hygiene: A Detailed Look at CIS Control\u202f2 and How PC\u202fMatic Aligns"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What is CIS and the Critical Security Controls?<\/h2>\n\n\n\n<p>The <strong>Center for Internet Security (CIS)<\/strong> is a nonprofit organization known for producing practical cybersecurity guidance for both the public and private sectors. Its most influential contribution is the <strong>CIS Critical Security Controls<\/strong> \u2014 a prioritized set of best practices designed to help organizations reduce risk, improve resilience, and defend against the most common types of cyberattacks.<\/p>\n\n\n\n<p>Think of them as a <strong>cybersecurity roadmap<\/strong>: instead of guessing what to do next, CIS tells you where to start, what to focus on, and how to track your progress.<\/p>\n\n\n\n<p>The <strong>CIS Controls<\/strong> are grouped into three <strong>Implementation Groups (IG1\u2013IG3)<\/strong>, which correspond to an organization\u2019s size, complexity, and available resources:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>IG1<\/strong>: Basic cyber hygiene \u2013 for small or resource-limited organizations.<\/li>\n\n\n\n<li><strong>IG2<\/strong>: Recommended practices for organizations with moderate complexity or regulatory pressure.<\/li>\n\n\n\n<li><strong>IG3<\/strong>: Advanced safeguards for high-value targets with dedicated security teams.<\/li>\n<\/ul>\n\n\n\n<p>Each group includes a subset of controls tailored to its risk profile. This tiered approach makes it easier for organizations to adopt controls at a pace and scale that makes sense for them \u2014 and to grow into stronger security postures over time.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" style=\"margin-top:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--60)\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">What Is CIS Implementation Group 1 (IG1)?<\/h2>\n\n\n\n<p><strong>IG1<\/strong> is the foundation \u2014 the &#8220;must-do&#8221; list for any organization that uses IT to run day-to-day operations. It consists of <strong>56 safeguards<\/strong> selected for their effectiveness against the most common attacks, including ransomware, phishing, insider misuse, and basic malware.<\/p>\n\n\n\n<p>Key traits of IG1:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Designed for organizations with <strong>limited IT and security resources<\/strong><\/li>\n\n\n\n<li>Prioritizes <strong>ease of implementation<\/strong> with off-the-shelf tools<\/li>\n\n\n\n<li>Focuses on <strong>operational continuity<\/strong> and <strong>essential defense<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Organizations that implement IG1 are often K-12 schools, local governments, nonprofit entities, and small to midsize businesses \u2014 groups frequently targeted by attackers but often underprepared.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" style=\"margin-top:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--60)\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">CIS Control\u202f2: Inventory and Control of Software Assets<\/h2>\n\n\n\n<p>CIS Control\u202f2 is critical because <strong>you can&#8217;t protect what you don&#8217;t know exists<\/strong>. This control focuses on ensuring organizations maintain an accurate, up-to-date inventory of all software in use \u2014 and that only <strong>authorized<\/strong> software is permitted to run.<\/p>\n\n\n\n<p>Here\u2019s how it breaks down under IG1:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><td><strong>Safeguard<\/strong><\/td><td><strong>Description<\/strong><\/td><td><strong>IG1 Requirement<\/strong><\/td><\/tr><\/thead><tbody><tr><td><strong>2.1<\/strong><\/td><td>Maintain a current inventory of all authorized software<\/td><td>Required<\/td><\/tr><tr><td><strong>2.2<\/strong><\/td><td>Ensure only authorized software is installed and executed<\/td><td>Required<\/td><\/tr><tr><td><strong>2.3<\/strong><\/td><td>Track software via automated tools<\/td><td>Required<\/td><\/tr><tr><td><strong>2.4<\/strong><\/td><td>Promptly address unauthorized or outdated software<\/td><td>Required<\/td><\/tr><tr><td><strong>2.5<\/strong><\/td><td>Implement application allowlisting<\/td><td>Not required in IG1 (first appears in IG2)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" style=\"margin-top:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--60)\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">PC Matic: How It Aligns with Control\u202f2 IG1 (and Then Some)<\/h2>\n\n\n\n<p><strong>PC Matic<\/strong> is a U.S.-based cybersecurity solution built around proactive protection. While many tools focus on detection and response, PC Matic flips the model \u2014 using <strong>default-deny allowlisting<\/strong> to stop threats before they execute.<\/p>\n\n\n\n<p>Let\u2019s see how it stacks up against the requirements of Control 2 under IG1:<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">2.1 \u2013 Software Inventory<\/h5>\n\n\n\n<p>PC Matic automatically builds and maintains a real-time inventory of installed applications across every endpoint. This inventory includes software name, version, installation path, and execution status \u2014 all accessible via a central dashboard.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">2.2 \u2013 Enforce Authorized Software Use<\/h5>\n\n\n\n<p>While allowlisting is technically an IG2 control, PC Matic enables it by default. Only trusted, verified software can execute, and admins can manage rules globally or per device. That means IG1 organizations get a level of protection <strong>above and beyond<\/strong> the baseline.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">2.3 \u2013 Use of Automated Tools<\/h5>\n\n\n\n<p>With centralized policy management and continuous software monitoring, PC Matic fulfills the automation requirement with minimal IT lift. New installs, unauthorized software, and changes are automatically flagged.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">2.4 \u2013 Response to Unauthorized Software<\/h5>\n\n\n\n<p>PC Matic can block execution of unauthorized apps, send real-time alerts to administrators, and log all activity \u2014 giving teams fast visibility and response capabilities even without a full SOC.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">2.5 \u2013 Built-In Application Allowlisting<\/h5>\n\n\n\n<p>Even though not required at the IG1 level, PC Matic provides full allowlisting from day one. For organizations looking to \u201cpunch above their weight\u201d and start climbing toward IG2 readiness, this feature is already baked in.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50)\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Final Takeaways<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CIS Controls<\/strong> give organizations a practical, phased roadmap to strengthen cybersecurity.<\/li>\n\n\n\n<li><strong>IG1<\/strong> is designed to be achievable and high-impact \u2014 especially for SMBs and local government.<\/li>\n\n\n\n<li><strong>Control 2<\/strong> is foundational: knowing what\u2019s running and ensuring it\u2019s supposed to be there.<\/li>\n\n\n\n<li><strong>PC Matic<\/strong> not only aligns with Control 2 under IG1 \u2014 it <strong>exceeds<\/strong> it, providing automation, enforcement, and allowlisting that typically only show up in higher-tier frameworks.<\/li>\n<\/ul>\n\n\n\n<p>For organizations that need <strong>results without complexity<\/strong>, PC Matic represents a strong, compliant, and forward-thinking choice.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is CIS and the Critical Security Controls? The Center for Internet Security (CIS) is a nonprofit organization known for producing practical cybersecurity guidance for both the public and private sectors. Its most influential contribution is the CIS Critical Security Controls \u2014 a prioritized set of best practices designed to help organizations reduce risk, improve [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":68055,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[6217],"tags":[],"class_list":["post-68054","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Elevating Cyber Hygiene: A Detailed Look at CIS Control\u202f2 and How PC\u202fMatic Aligns<\/title>\n<meta name=\"description\" content=\"What is CIS and the Critical Security Controls? The Center for Internet Security (CIS) is a nonprofit organization known for producing practical\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Elevating Cyber Hygiene: A Detailed Look at CIS Control\u202f2 and How PC\u202fMatic Aligns\" \/>\n<meta property=\"og:description\" content=\"What is CIS and the Critical Security Controls? The Center for Internet Security (CIS) is a nonprofit organization known for producing practical\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-30T16:39:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-30T16:39:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-10.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Molden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Molden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\\\/\"},\"author\":{\"name\":\"Jessica Molden\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\"},\"headline\":\"Elevating Cyber Hygiene: A Detailed Look at CIS Control\u202f2 and How PC\u202fMatic Aligns\",\"datePublished\":\"2025-07-30T16:39:32+00:00\",\"dateModified\":\"2025-07-30T16:39:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\\\/\"},\"wordCount\":726,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-10.jpg\",\"articleSection\":[\"Business Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\\\/\",\"name\":\"Elevating Cyber Hygiene: A Detailed Look at CIS Control\u202f2 and How PC\u202fMatic Aligns\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-10.jpg\",\"datePublished\":\"2025-07-30T16:39:32+00:00\",\"dateModified\":\"2025-07-30T16:39:33+00:00\",\"description\":\"What is CIS and the Critical Security Controls? The Center for Internet Security (CIS) is a nonprofit organization known for producing practical\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-10.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-10.jpg\",\"width\":2240,\"height\":1260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Elevating Cyber Hygiene: A Detailed Look at CIS Control\u202f2 and How PC\u202fMatic Aligns\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\",\"name\":\"Jessica Molden\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/jmolden\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Elevating Cyber Hygiene: A Detailed Look at CIS Control\u202f2 and How PC\u202fMatic Aligns","description":"What is CIS and the Critical Security Controls? The Center for Internet Security (CIS) is a nonprofit organization known for producing practical","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/","og_locale":"en_US","og_type":"article","og_title":"Elevating Cyber Hygiene: A Detailed Look at CIS Control\u202f2 and How PC\u202fMatic Aligns","og_description":"What is CIS and the Critical Security Controls? The Center for Internet Security (CIS) is a nonprofit organization known for producing practical","og_url":"https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2025-07-30T16:39:32+00:00","article_modified_time":"2025-07-30T16:39:33+00:00","og_image":[{"width":2240,"height":1260,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-10.jpg","type":"image\/jpeg"}],"author":"Jessica Molden","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Jessica Molden","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/"},"author":{"name":"Jessica Molden","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700"},"headline":"Elevating Cyber Hygiene: A Detailed Look at CIS Control\u202f2 and How PC\u202fMatic Aligns","datePublished":"2025-07-30T16:39:32+00:00","dateModified":"2025-07-30T16:39:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/"},"wordCount":726,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-10.jpg","articleSection":["Business Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/","url":"https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/","name":"Elevating Cyber Hygiene: A Detailed Look at CIS Control\u202f2 and How PC\u202fMatic Aligns","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-10.jpg","datePublished":"2025-07-30T16:39:32+00:00","dateModified":"2025-07-30T16:39:33+00:00","description":"What is CIS and the Critical Security Controls? The Center for Internet Security (CIS) is a nonprofit organization known for producing practical","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-10.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-10.jpg","width":2240,"height":1260},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/elevating-cyber-hygiene-a-detailed-look-at-cis-control-2-and-how-pc-matic-aligns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Elevating Cyber Hygiene: A Detailed Look at CIS Control\u202f2 and How PC\u202fMatic Aligns"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700","name":"Jessica Molden","url":"https:\/\/www.pcmatic.com\/blog\/author\/jmolden\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=68054"}],"version-history":[{"count":1,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68054\/revisions"}],"predecessor-version":[{"id":68056,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68054\/revisions\/68056"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/68055"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=68054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=68054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=68054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}