As 2018 comes to a close, on behalf of everyone at CSI I would like to say thank you for entrusting us with your technology needs. Unlike most of our competitors we solely service K-12 and Public Sector. We take your network very seriously. We take what happens to it personally.
As we approach the holiday break it is time once again to remember some basic maintenance that should be done. On a day where there isn’t any bad weather predicted and there have been no power outages I want you to calibrate all your UPSes. Calibration allows an APC Smart UPS to re-evaluate itself.
The FBI came to visit us last week. No it wasn’t an investigation. It was for CSI’s 3rd annual Security Event. I have talked about the topic of Cyber Threats in person and on-line, but our Supervisory Special Agent had a few interesting things to say beyond the topics Bob and I have been discussing […]
I am watching with some interest a growing trend with district’s implementing newer IP-based building systems (HVAC control, food service temperature controls, door control, video surveillance, etc.) and when properly implemented I think this a fine thing.
As you go through your normal yearly planning cycles remember that in January 2020 Microsoft will be retiring Windows Server 2008 R2, Windows 7, and Microsoft Exchange 2010. That means no security updates and no vendor support if something goes wrong.
In an Active Directory domain, we generally rely heavily on group policies. Microsoft best practices say that you should have at least two domain controllers. Most of our clients have two or more domain controllers. Those domain controllers need to replicate Active Directory information, DNS information, and Group Policy information (i.e. SYSVOL) so that everyone […]
When all else fails we reach for the backups. However, increasingly the bad guys are consciously seeking out your backups and deleting them as part of elaborate ransomware routines to force you to pay to recover your data. This can be as simple as the bad guys deleting your volume shadow copies to as complex […]
Trend Micro has stated many times that you have approximately 4 minutes between when a threat enters your network and the infection breaks out. But who can respond that quickly? I have often said if we leave questions on the computer up to our end users, we have failed.
At some point in your life, you probably were locked out of something – your house, your car, your office. I am sure it was awful trying to figure out how you were going to solve that problem. However, to add to your stress, we now have all this sensitive data online and on our […]
Most of Google’s products are free. The reason is that you are their product. Their computers read your emails. They send you targeted ads based upon what you read and write. They track your location. They track your likes and dislikes. They have made your life more convenient by syncing all your Google Chrome data.