It has been a very frustrating couple of months trying to keep everyone safe and stable. Since the Spring we have been pummeled by multiple Exchange exploits, a Microsoft 365 exploit, a bunch of printing exploits quickly followed by massive printing stability issues.
Over the first three Securing Active Directory webinars, we have covered a lot of ground. If you haven’t watched them, I would encourage you to do so as they are every bit as relevant today as they were when we did them over the last couple of years.
Would you like a more organized, hardened environment considering today’s threat landscape? What actions can you take to foster better outcomes for the district should you be audited? What should you do in the interim if you can’t get the funding you need to properly secure your district? The good news is there are […]
“A chain is only as strong as its weakest link” -Thomas Reid, “Essays on the Intellectual Powers of Man” – 1786 The SolarWinds Orion hack has been in the news for months now. It is now alleged that an “intern” put a very weak, easily crackable password on a critical system and then copied […]
“A chain is only as strong as its weakest link” -Thomas Reid, “Essays on the Intellectual Powers of Man” – 1786 The SolarWinds Orion hack has been in the news for months now. It is now alleged that an “intern” put a very weak, easily crackable password on a critical system and then copied […]
There is nothing more important than keeping your district and staff and students safe. Cybersecurity is not a topic that you can simply check off the list as done. Much like the computer industry itself, six months ago was the Stone Age.
Today’s NIST topic is data recovery. The most obvious example of meeting this NIST standard is maintaining good backups. This is something we have all been doing forever, but as long as we have done it, I constantly see the same issues over and over.
There are pros and cons to each of these scenarios. However, we believe we have a better way to deliver high-quality support to your district. It is called Co-Managed IT services (Co-MITS). It combines the best of your district staff with CSI’s technical and monitoring capabilities to create a powerful, responsive, flexible support team.
Today we continue our look at a series of practical steps that districts can use to increase their NIST compliance. Looking at the complete set of NIST controls can be a daunting experience. One of the best ways we have found to make these cybersecurity improvements more attainable is following the CIS Controls Top […]
Controlled Use of Administrative Privileges / DETECT / PROTECT..Change Default Passwords..Ensure the Use of Dedicated Administrative Accounts There is a lot here to unpack. If you haven’t done so already, you should try very hard to break your reliance on the default “Administrator” account.