There are pros and cons to each of these scenarios. However, we believe we have a better way to deliver high-quality support to your district. It is called Co-Managed IT services (Co-MITS). It combines the best of your district staff with CSI’s technical and monitoring capabilities to create a powerful, responsive, flexible support team.
Today we continue our look at a series of practical steps that districts can use to increase their NIST compliance. Looking at the complete set of NIST controls can be a daunting experience. One of the best ways we have found to make these cybersecurity improvements more attainable is following the CIS Controls Top […]
Controlled Use of Administrative Privileges / DETECT / PROTECT..Change Default Passwords..Ensure the Use of Dedicated Administrative Accounts There is a lot here to unpack. If you haven’t done so already, you should try very hard to break your reliance on the default “Administrator” account.
As we continue our NIST series, I am going to take a moment and discuss inventory and control of software assets in the IDENTIFY / RESPOND category There are a number of practical ways to better control our software inventory.
Weekly Tech Tidbit – Guarding The Wall “Son, we live in a world that has walls, and those walls have to be guarded by men with guns” -Col. Jessep “A Few Good Men” That classic movie line rings true on all our networks.
“Clean up, clean up, everybody, everywhere, Clean up, clean up everybody do their share” -Barney That song has been stuck in my head recently having two Kindergarten aged kids in the house. However, after many of the conversations I have had with you over the last few weeks, it seems an appropriate message this […]
“When it absolutely, positively has to be there overnight” – FedEx As many of you know, Bob and I have been doing this for a while – 41 years in fact. And through all those years, every day is new and fun. Thanks for your support and friendship and trust through all those years.
Last time I talked about making email safer. I focused on inbound email to your users and outbound encrypted emails. However, I neglected to say that advanced spam filters also work outbound. That means that your end-users email and attachments will be scanned to protect against an inadvertent sending out of malicious content.
Last week I talked about the importance of Cloud Backup in our new remote teaching and learning and back-office school environments. This week I am going to talk about secure and reliable communications. The reality is that the number one threat to your network is your users clicking on attachments or web links that lead […]
Disk encryption is growing in popularity as a means of better-securing laptops and desktops. Microsoft is offering BitLocker natively in Windows 10. Microsoft Endpoint Configuration Manager has a built-in BitLocker Administration console. If you don’t have SCCM, then Microsoft offers the MBAM console to manage encryption.