Scammers have found a way to exploit vulnerabilities in VoIP (Voice over Internet Protocol) via a scam called vishing. This scam works much like any phishing attack: a scammer purports to be a legitimate entity and asks the potential victim to provide sensitive information. Learn how vishers operate. VoIP makes it easy to create fake […]
Workplace Analytics allows managers to assess their employees’ performance using the data gathered from Office 365. Unlike past Microsoft productivity tools that showed only the user’s own information, Workplace Analytics allows both employees and managers to view each others’ performance data. How does Workplace Analytics work? A paid add-on to Office 365 enterprise plans, Workplace […]
Is your Google Chrome browser a little slower lately? While Chrome is widely known as the browser of choice, it does have a habit of consuming a lot of system RAM. Additionally, there are times when it feels slower than before. Fortunately, these problems are simple to fix. Here are some speed hacks that will […]
Businesses need technology to be profitable and productive. But not all technologies are capable of delivering on their perceived benefits. To make sure your investments are worth keeping, you need to perform technology business reviews. A technology business review reveals the strengths and weaknesses of your company’s IT framework. It’s often performed by a third-party […]
Microsoft has announced they are tightening the security standards for LDAP communications on Microsoft Active Directory networks. This has huge implications as there are so many things in a typical school district's use that require some form of LDAP communication.
Bloatware is pre-installed software (that may or may not be malicious) that typically requires an unwarranted amount of disk space, slowing down your computer and exposing you to more cybersecurity risks. Superfish In mid-2014, Lenovo users noticed that something was awry with their web browsers: banner ads were breaking webpage layouts and pop-ups were making […]
The booming market for cybersecurity products is a sign that businesses are taking the issue seriously. But before your company invests in any product, ask yourself if it’s something you really need. Here are some tips on how you can make the most out of your cybersecurity investment. Uncover threats and vulnerabilities Every business should […]
In the continuing quest to battle ransomware in our networks, as well as other types of malware, just this month (Jan 2020) the National Institute of Standards and Technology (NIST) has released a brand-new guide to assist in this battle.
CSI is growing again. We are looking for high-quality individuals to work with our service delivery team.
For more information on the positions available please click here.
CSI Tech Talk Webinar – Leveraging CSEDR to Control USB Devices – Wednesday, February 12th – Sign Up Now!
Scott Quimby will take you through the CSEDR SentinelOne console providing an overview of core features and functions. He will specifically highlight the new USB and Bluetooth Endpoint console functionality.
Securing your servers and endpoints is vital to keep your network safe.