Meeting the CIS critical security controls: Using university-sponsored solutions when possible and other solutions when necessary