It seems like Cyber Attacks are happening everywhere these days. Whether it’s a national news report of an attack against a company that has your credit card information or local news reporting a school district like yours that’s been hit with a ransomware/data breach, these stories are plentiful.
Introducing CSI’s CyberCNS Vulnerability Advisory Service Featuring ConnectSecure V4.0 – Recording Available

Is Your Firewall Healthy Enough to Protect Your District?
Today’s Internet and network security environment differs greatly from just a few short years ago. As we’ve discussed, legacy tools, basic firewalls, and basic anti-virus/malware are no longer sufficient to keep your network safe. Many districts have implemented next-generation firewalls.
Tech Tidbit – 2024-2025 – The Year of Network Visibility
Every year, we hear about the Chinese New Year, the animal featured that year, and its significance. With the start of the new school year, I would like to declare the 2024-2025 school year “The Year of Visibility.

Using CPGs in Real Life – Develop and Exercise a Cyber Incident Response Plan
You arrive at work tomorrow and are greeted by the news that a cyber-attack has compromised your district’s network, and the network is unavailable. What is the first thing you do? What is the second? When confronted by such alarming news, most people would be overwhelmed and unsure of the next steps.

Introducing CSI’s CyberCNS Vulnerability Advisory Service – Recording Available
It seems like Cyber Attacks are happening everywhere these days. Whether it’s a national news report of an attack against a company that has your credit card information or local news reporting a school district like yours that’s been hit with a ransomware/data breach, these stories are plentiful.

Using CPGs in Real Life – Perform and Test Backups
What would you do if you came into school tomorrow and were told that all your District’s data had been corrupted? Your next step would be to check in with your IT staff to see if they were clearing your system and restoring your data with a backup.

What are CPGs and Why is Everyone talking about them?
Have you ever started looking into a complex topic, and been overwhelmed by all the details of what is involved? Not only is it hard to understand, but implementing everything can be mind-boggling. Most people have this reaction to the National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF). While the NIST CSF […]

Tech Tidbit – What I am seeing on the vulnerability front
We have had several districts come online with CSI’s CyberCNS Vulnerability Advisory Service. That has given me a substantial amount of vulnerability reports to sift through. One of the nice features of our service is that the vulnerability report not only shows the vulnerabilities, where they are, and how to resolve them, but it also […]

Tech Tidbit – Endpoint Encryption Must Be Turned On – Everywhere
Today’s Tidbit should be quite simple once you get going. NIST requires data to be encrypted in transit and at rest. Probably you have a number of staff and techs who have laptops that leave the district.

NIST Cybersecurity Framework – Malware Defenses
This week I would like to talk to you about Malware Defenses. This topic is in the NIST Detect and Protect categories. Antivirus has been around for what seems like forever. However, as long as antivirus has existed, we have had the problem with getting it on “all” servers and “all” endpoints.
- 1
- 2