It seems like Cyber Attacks are happening everywhere these days. Whether it’s a national news report of an attack against a company that has your credit card information or local news reporting a school district like yours that’s been hit with a ransomware/data breach, these stories are plentiful.
Scott Quimby discusses the following: Reading DMARC reports – In preparation for achieving DMARC Quarantine status, Scott will walk you through reading DMARC reports and look at what they mean and what actions are required based on the data.
The first session will be led by Scott Quimby, CISSP, Vice President and CTO of CSI. He will focus on “Tech Tidbits” providing timely informational updates on industry news and cybersecurity issues impacting the K-12 environment. Watch it here × Please fill the form below
Join us, as Jeff Pigula, CSI Senior Network Engineer (Cisco CCNA and CC-NSF) will be discussing the changing world of PoE power management – what you need to know to keep from being driven crazy with the proliferation of new PoE devices being added to your network.
It has been reported that when attackers breach your network, they often first go after your backups in an attempt to corrupt them so that you have no option to get your data back but to pay the ransom. I recently saw some statistics that when they gain access to the backups, they are at […]
You all may have heard Scott talking about “those ex-NSA guys at Huntress” he talks to. Bob and Scott have been stressing the importance of layers of security for proper cyber defense for many years now. CSI uses Huntress on all Windows machines.
Speaker: Alan Winchester, Chief Development Officer, Caetra.io Alan Winchester is the Chief Development Officer and creator of CyMetric™. His vision is to enable customers overwhelmed with the issues surrounding legal compliance to meet their obligations intuitively and simply, reducing the need to incur the expenses of consultants and lawyers.
Mitre Engenuity has released its 2022 fully independent evaluation of 30 of the most common cybersecurity endpoint protection platforms. Why does this matter? The 2022 assessment and results are particularly interesting because the payload they used is the most common, and nefarious, ransomware and malware variants in use today.
“Just when you thought it was safe to go back in the water…” ― Peter Benchley, Jaws It is a scary world out there. We know that upwards of 70% of network breaches start with phishing attacks coming from emails.
Please join us for CSI’s Cybersecurity Event, Session Three! We will continue to build the list of actions you can take to better protect your district from the current threat landscape. Speaker: Justin Pennock, Cisco Cybersecurity Sales Specialist Session Description: Go on the offensive and join us for a demo on Cisco Umbrella […]