Cybersecurity Event Session Two: The Front Lines of Ransomware Speaker: Chris Loehr, Co-Founder, Service Provider Partners Chris Loehr is a cybersecurity professional and has worked firsthand on the resolution of roughly 300 ransomware incidents this past year.
Join us for a quick, 30-minute webinar to learn about the potential technology funding available to school districts through the American Rescue Plan Act (ARPA). Vince Siragusa, Public Funding Advisor from Cisco Meraki will cover these two funding buckets from the ARPA legislation: ESSER III for public K12 schools Emergency connectivity fund Under […]
Over the first three Securing Active Directory webinars, we have covered a lot of ground. If you haven’t watched them, I would encourage you to do so as they are every bit as relevant today as they were when we did them over the last couple of years.
Would you like a more organized, hardened environment considering today’s threat landscape? What actions can you take to foster better outcomes for the district should you be audited? What should you do in the interim if you can’t get the funding you need to properly secure your district? The good news is there are […]
There are pros and cons to each of these scenarios. However, we believe we have a better way to deliver high-quality support to your district. It is called Co-Managed IT services (Co-MITS). It combines the best of your district staff with CSI’s technical and monitoring capabilities to create a powerful, responsive, flexible support team.
K-12 education has been turned upside down. Remote learning is obviously the term du jour. At the same time as we are figuring out what remote instruction means, school districts still have to keep the buildings safe and run all the back-office functions.
Just when you thought it was safe to move along to other technical topics, along comes Scott Quimby’s Hardening Active Directory Part III to scare you even more. If you haven’t watched Part I and Part II, you can find them here. In Part III we will do a little review of some core topics […]
We are so focused on our networks being breached and the bad guys gaining a foothold to steal our money and personally identifiable information that we often forget is that we as techs can make mistakes and inadvertently give away access to sensitive/confidential parts of the network.
The reality is that your network is under attack. We need to protect our servers. We need to protect our data. One way we do that is by not remoting into servers to do basic tasks. Almost everything we need to do, we can now do remotely. Also, we can do many tasks with a […]