We wanted to let you know the CSI Tech Talk meeting and webinar dates for the 2017-2018 school year. Our Tech Talk free knowledge transfer sessions are designed for technical staff responsible for technology support in your organization. Attendees at our previous meetings have given us the highest ratings for the quality of our presentations.
The reality is that your network is under attack. The bad guys are using advanced machine learning techniques to exploit sometimes subtle vulnerabilities in your network implementation and design to gain a foothold inside your network. These footholds then use map the network, determine who the domain admin IDs are, who the local admins […]
The next CSI Tech Talk Webinar entitled, “Hardening Active Directory and Group Policy Part II” is scheduled for Tuesday, September 19th at 10:30 am. The reality is that your network is under attack. The bad guys are using advanced machine learning techniques to exploit sometimes subtle vulnerabilities in your network implementation and design […]
CSI is pleased to announce that our Federal GSA IT Schedule 70 contract has been renewed. This renewal came after an audit of compliance with the GSA federal guidelines and a review of our performance under the contract. Our Federal GSA IT Schedule 70 contract can be used for the following items: CSI Professional IT […]
The reality is that your network is under attack. The bad guys are using advanced machine learning techniques to exploit sometimes subtle vulnerabilities in your network implementation and design to gain a foothold inside your network. These footholds then use map the network, determine who the domain admin IDs are, who the local admins […]
Systems Affected Microsoft Windows operating systems Overview According to numerous open-source reports, a widespread ransomware campaign is affecting various organizations with reports of tens of thousands of infections in as many as 74 countries, including the United States, United Kingdom, Spain, Russia, Taiwan, France, and Japan.
The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency […]
Apple has released security updates to address vulnerabilities in multiple products. A remote attacker may exploit some of these vulnerabilities to take control of an affected system. US-CERT encourages users and administrators to review Apple security pages for the following products and apply the necessary updates: macOS Sierra, Security Updates(link is external) iOS(link is external) […]
Microsoft solution available to protect additional products Today many of our customers around the world and the critical systems they depend on were victims of malicious “WannaCrypt” software. Seeing businesses and individuals affected by cyberattacks, such as the ones reported today, was painful.
This is so cool. This guy really did save a big part of the world. A 22-year-old British cybersecurity researcher thwarted yesterday’s “Wanna Decryptor 2.0” cyber attack that affected computers worldwide by spending nearly $11, the Washington Post reports.