Resources

Weekly Tech Tidbit – Preventing Data Leaks

In my 20s I went to Tahiti and went on a sunset cruise on the famed "Liki Tiki".   It was an amazing sunset.  Hula girls, and music.   Along the way the Liki Tiki sprung a leak.   It was pitch black, and the boat was taking on water.  The captain and crew knew they were taking on water but had no idea where it was coming from.

Weekly Tech Tidbit – Do you know your SA Password?

A constant frustration of ours is ensuring "clean" backups.   If you corrupt your data or have a server failure, we need to reliably get that data back.  There are a few types of backups.   Image backups are popular with virtualization.  File system backups have always been the gold standard since the dawn of backups.

CSI Tech Talk – Securing Your Endpoints. Securing Your Network – Tuesday October 22nd – Sign Up Now!

As we start the school year, security is once again on everyone’s mind. Recent events have brought significant cyberattacks literally to our doorstep. The pace of these attacks is increasing. After consulting with many area Tech Directors about what was most on their mind, we put our heads together and we are going to go back to some basic, foundational steps you can take to better secure your endpoints and ultimately your network.

Hardening Active Directory Part III – More information from the front lines – Recording Available

Just when you thought it was safe to move along to other technical topics, along comes Scott Quimby's Hardening Active Directory Part III to scare you even more.  If you haven't watched Part I and Part II, you can find them here.

In Part III we will do a little review of some core topics of Active Directory Security plus share some latest information from the front lines in terms of some of the more subtle exposures that are not top of mind that we all need to be defending against.

Weekly Tech Tidbit – Rethinking SSLs

We harp on the fact that if you have *ANY* VPN, or remote access capabilities into your district, you *MUST* use a commercial SSL certificate and not a self-signed SSL - no exceptions.

However, an area of growing frustration is that many current browsers are starting to give warnings about whether or not you should trust a legitimate, non-infected, web site that doesn't have an SSL.

Many of you have heard me say time and again, "if we ask the end user a question, we have failed".   This is the latest iteration of that edict.

CSI is pleased to announce that we are an approved reseller under the NCPA Cooperative Purchasing Alliance

Through our partnership with Synnex Corporation CSI is an approved vendor on the NCPA national purchasing contract which is a legal alternative for our public sector and K-12 clients to either the NYS OGS or Federal GSA IT Schedule 70 contracts.NCPA (National Cooperative Purchasing Alliance)

NCPA  is a leading national government purchasing cooperative working to reduce the cost of goods and services by leveraging the purchasing power of public agencies in all 50 states.

Common Facebook marketing mistakes

Facebook has grown rapidly in the past decade and now boasts over two billion monthly active users. These users are constantly liking, sharing, commenting, and posting on the platform. Many businesses see this as an opportunity to grow their customer base so they integrate Facebook advertising into their marketing strategies. To guide you, here’s a […]

Which web browser is the safest?

Enterprise cybersecurity is a holistic system that involves employing security practices at every level of use. This includes picking out the most secure application for web browsing. Consider the security features of these popular web browsers when picking yours. Microsoft Edge Microsoft Edge, Windows’ current default browser, is an improvement over its predecessor Internet Explorer […]

Tips and tricks for collecting customer data

Businesses have more access to customer data than ever before, and that trend will likely continue in the future. The insights you get from all that data are valuable. However, a lot of data is unnecessary or possibly even problematic. To ensure your insights are relevant and useful, you must have a well-defined data collection […]

Windows 10 makes backing up files easy

To any business, ransomware means trouble. From operational disruption and revenue loss to total shutdown, it spares no part of the company. That’s why it’s wise to regularly back up your business data in multiple locations, including the cloud. If your computer is running on Windows 10, you’re in luck because the operating system makes […]

5 Security issues to look out for

The security of your systems and technology is a constant battle, and one you will likely never completely win. There are significant steps you can take to secure your systems, but having knowledge about your systems is one of the most effective tools. If you know how your systems can be breached, you can ensure […]

Verifying Android apps

Android tablets are among the most popular devices on the market today. With a wide variety of sizes and designs, users are spoiled for choice. Not only that, there are a lot of apps available on Google Play Store. Unfortunately, cybercriminals also create fake apps with malicious code — and these apps can be hard […]

Introducing macOS Catalina

With its big launch just a few days away, macOS Catalina is creating quite a buzz in the world of computing. Many Mac users can’t wait to upgrade their devices to the next-gen operating system and enjoy its exciting new features. Here are some of the things you can expect from Catalina. Before you download […]