Resources

Tech Tidbit – Thoughts About The AT&T Breach

You have probably heard of the AT&T breach by now. Reports describe it as the largest breach in history with serious national security consequences. AT&T has reported that threat actors stole all client call and text records for six months. I have not read anything indicating that the threat actors know the contents of any […]

Read more

Tech Tidbit – Who Do You Trust?

“Trust but verify.” -President Ronald Reagan, December 8th, 1987, at the Intermediate-Range Nuclear Forces (INF) Treaty Signing I watched a presentation the other day by the head of Threat Operations for a major Security Operations Center (SOC) that provides 24/7 security oversight over networks like yours.

Read more

Tech Tidbit – CSI Goes On A Field Trip To Marist College

Gabe, Lisa, and I attended the annual CyberSecurity Summit at my Alma Mater, Marist College. Back in the day, at the beginning of the IBM/Marist Joint Study, I was asked to be on the board of that program. My 20-year-old self had a lot of fun hanging out with the CEO of IBM and discussing […]

Read more

Acuture/CSI is hiring. Come join our growing family!

Acture/CSI is growing again.  We are looking for high-quality individuals to work with our service delivery team. Please search our Acture/CSI online job database for opportunities in our Albany and Fishkill offices.   Click here and add your resume to be considered for future employment:  Acture Solutions Career Center.

Read more

Priority 1 – Deploy Multi-factor Authentication (MFA)

CISA in their January and August 2023 Bulletins again called out some of the most important ways that schools can protect themselves from cyber attacks. In both reports, CISA suggested that schools start their Cybersecurity journey by implementing six of the Highest-priority security measures.

Read more

Tech Tidbit – Thoughts About Passwords

Recently it was worldwide “change your password” day! I have a few thoughts. If you attended the CSI CyberSecurity event in December, you heard the NYS SED CISO get caught up in the incongruent password guidance between NYS and NIST CSF. Unfortunately, there was no breakthrough in this discussion, but NYS SED heard you that […]

Read more

Using CPGs in Real Life – Minimize Exposures to Common Attacks

Would you be comfortable giving your plumber the key to your house so he/she can come in at any time to fix anything they might feel is amiss? The answer is probably no. Did you know that when you give a vendor unfettered access to your network you are essentially doing the same thing? Similarly, […]

Read more