Resources

Weekly Tech Tidbit – Security Steps you can take TODAY

Bob and are now multiple years in discussing the same thing - how to improve your district's security footprint.   For most of that time many ignored our warnings as too hard, too expensive, or "on my list".  But when a member of the family dies, everything  becomes very real and suddenly what is impossible becomes absolutely necessary.

Weekly Tech Tidbit – Implementing DNS Security

Most of can easily agree that our IT universe has been dominated over the past several months by cybersecurity discussions as we daily (sometimes it feels like hourly) see reports of the next cybersecurity event that has occurred in our nation, state, or sometimes with our peers.

Weekly Tech Tidbit – Ransomware and Backups

We have been having a lot of discussions about how to better protect against ransomware and other threats with the recent attacks that have happened in area school districts.   Recently, I heard a story about a network that was hit with ransomware.  The network admins cleaned up the mess and started to restore their "air-gapped" backups.

Weekly Tech Tidbit – Cyber Safety for Students

This week’s Tech Tidbit is shorter on my thoughts and words since the attached link below contains lots of reading on its own.

For the start of the new school year the Cybersecurity and Infrastructure Security Agency (CISA), part of the US Dept of Homeland Security’s National Cyber Awareness System put out a nice document with a collection of information and tool kits all based around Cyber Safety for Students.

Weekly Tech Tidbit – Managing Switch Stacks

Over the past few years, we have been recommending the use of switch stacks in all your MDF and IDF locations.   This has been done to aid in simplifying switch management, but it has led to some confusion from time to time when someone is physically working in one of the network closets.

Weekly Tech Tidbit – Preventing Data Leaks

In my 20s I went to Tahiti and went on a sunset cruise on the famed "Liki Tiki".   It was an amazing sunset.  Hula girls, and music.   Along the way the Liki Tiki sprung a leak.   It was pitch black, and the boat was taking on water.  The captain and crew knew they were taking on water but had no idea where it was coming from.

Weekly Tech Tidbit – Do you know your SA Password?

A constant frustration of ours is ensuring "clean" backups.   If you corrupt your data or have a server failure, we need to reliably get that data back.  There are a few types of backups.   Image backups are popular with virtualization.  File system backups have always been the gold standard since the dawn of backups.

Hardening Active Directory Part III – More information from the front lines – Recording Available

Just when you thought it was safe to move along to other technical topics, along comes Scott Quimby's Hardening Active Directory Part III to scare you even more.  If you haven't watched Part I and Part II, you can find them here.

In Part III we will do a little review of some core topics of Active Directory Security plus share some latest information from the front lines in terms of some of the more subtle exposures that are not top of mind that we all need to be defending against.

CSI is pleased to announce that we are an approved reseller under the NCPA Cooperative Purchasing Alliance

Through our partnership with Synnex Corporation CSI is an approved vendor on the NCPA national purchasing contract which is a legal alternative for our public sector and K-12 clients to either the NYS OGS or Federal GSA IT Schedule 70 contracts.NCPA (National Cooperative Purchasing Alliance)

NCPA  is a leading national government purchasing cooperative working to reduce the cost of goods and services by leveraging the purchasing power of public agencies in all 50 states.

The definitive Android tablet gift guide for 2019

It’s the season of giving, and there’s no better way to show your generosity than by giving an Android tablet as a gift. But with the seemingly endless choices of tablets in the market, how do you choose the perfect gift? Look no further and start here. What’s your budget? Giving gifts shouldn’t burn a […]

6 Signs it’s time to replace your Mac

Apple computers are built to last. However, you’ll eventually experience some issues with their machines and have to replace it with a new one. But how do you determine if it’s finally time to put your Mac to rest? Let’s highlight some of the signs you need to look out for. Your device can’t support […]

Choosing an office Wi-Fi router

Selecting a Wi-Fi router, much like selecting any other piece of equipment for your business, can be a complicated task. There are a variety of models available that it can be a chore to work out the best option. However, if you know what features to look for, it’s much easier to make the right […]

TDoS: An attack on VoIP systems

Denial-of-service (DoS) attacks are nothing new. But most businesses have no idea how to prevent this type of attack on their Voice over Internet Protocol (VoIP) system. If you’re one of those businesses, we have everything you need to know right here. Denial-of-service attacks The end goal of any DoS attack is to overwhelm a […]

Secure your data in the cloud

Data breaches are a common occurrence in today’s business environment. While many businesses have turned to cloud apps for better productivity, scalability, and savings, some worry that the cloud is more vulnerable to data breaches than an on-premises data center. The truth is that any computing environment is vulnerable if you don’t take steps to […]

BI is not just for the big boys

Most of us don’t normally associate Business Intelligence (BI) with small- or medium-sized businesses (SMBs). The huge investment required to hire data-delving specialists makes us think BI is only for larger organizations. But this is no longer the case. Not only does a growing selection of self-service tools make BI more affordable for SMBs, but […]