CSI is growing again. We are looking for high-quality individuals to work with our service delivery team. For more information on the positions available, please click here.
CSI is growing again. We are looking for high-quality individuals to work with our service delivery team. For more information on the positions available, please click here.
It has been reported that when attackers breach your network, they often first go after your backups in an attempt to corrupt them so that you have no option to get your data back but to pay the ransom. I recently saw some statistics that when they gain access to the backups, they are at […]
We live in interesting times and continue to face some very unique challenges to keep your school district safe and stable so teachers can teach, students can learn and the staff behind the scenes can do all the important tasks that make the district function well.
Please join us *tomorrow – Wednesday, October 12th* for an upcoming webinar focusing on Business Email Compromise. Jason Whitehurst, a cybersecurity professional, will be speaking about the significant increase in business email compromises for school systems.
We always have the Paladin Sentinel Monitoring console up during the day. I am still seeing mass use of the domain administrator account to RDP into servers and lots of daily RDP connections in general. There are legitimate reasons to RDP into servers.
This month we talked about how the Ukraine situation affects the cybersecurity landscape for the US and what it means for network security. Leading this discussion was Jason Whitehurst, a cybersecurity professional of over 20+ years, and Vince Crisler, former White House CISO and DarkCubed founder and CEO. Scott Quimby had the opportunity to listen […]
Mitre Engenuity has released its 2022 fully independent evaluation of 30 of the most common cybersecurity endpoint protection platforms. Why does this matter? The 2022 assessment and results are particularly interesting because the payload they used is the most common, and nefarious, ransomware and malware variants in use today.
Just when you thought it was safe to move along to other technical topics, along comes Scott Quimby’s Hardening Active Directory Part III to scare you even more. If you haven’t watched Part I and Part II, you can find them here. In Part III we will do a little review of some core topics […]
We are so focused on our networks being breached and the bad guys gaining a foothold to steal our money and personally identifiable information that we often forget is that we as techs can make mistakes and inadvertently give away access to sensitive/confidential parts of the network.
The reality is that your network is under attack. We need to protect our servers. We need to protect our data. One way we do that is by not remoting into servers to do basic tasks. Almost everything we need to do, we can now do remotely. Also, we can do many tasks with a […]