Welcome to the inaugural edition of CSI’s “Your Weekly Tech Tidbit”. Building on Scott’s ever popular Tech Tidbits portion of our quarterly Tech Talk / SYSOP meetings, each week either Scott or I will be sharing a timely thought for the week based upon what we see happening in IT that is of relevance to […]
The October Tech Talk meeting was jammed packed with information. There was more information than time allowed us to present. Therefore, Scott is going to do a special November Tech Tidbits webinar presentation on Tuesday November 14th at 10:30 am.
We wanted to let you know the CSI Tech Talk meeting and webinar dates for the 2017-2018 school year. Our Tech Talk free knowledge transfer sessions are designed for technical staff responsible for technology support in your organization. Attendees at our previous meetings have given us the highest ratings for the quality of our presentations.
The reality is that your network is under attack. The bad guys are using advanced machine learning techniques to exploit sometimes subtle vulnerabilities in your network implementation and design to gain a foothold inside your network. These footholds then use map the network, determine who the domain admin IDs are, who the local admins […]
The next CSI Tech Talk Webinar entitled, “Hardening Active Directory and Group Policy Part II” is scheduled for Tuesday, September 19th at 10:30 am. The reality is that your network is under attack. The bad guys are using advanced machine learning techniques to exploit sometimes subtle vulnerabilities in your network implementation and design […]
CSI is pleased to announce that our Federal GSA IT Schedule 70 contract has been renewed. This renewal came after an audit of compliance with the GSA federal guidelines and a review of our performance under the contract. Our Federal GSA IT Schedule 70 contract can be used for the following items: CSI Professional IT […]
The reality is that your network is under attack. The bad guys are using advanced machine learning techniques to exploit sometimes subtle vulnerabilities in your network implementation and design to gain a foothold inside your network. These footholds then use map the network, determine who the domain admin IDs are, who the local admins […]
Systems Affected Microsoft Windows operating systems Overview According to numerous open-source reports, a widespread ransomware campaign is affecting various organizations with reports of tens of thousands of infections in as many as 74 countries, including the United States, United Kingdom, Spain, Russia, Taiwan, France, and Japan.
The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency […]
Apple has released security updates to address vulnerabilities in multiple products. A remote attacker may exploit some of these vulnerabilities to take control of an affected system. US-CERT encourages users and administrators to review Apple security pages for the following products and apply the necessary updates: macOS Sierra, Security Updates(link is external) iOS(link is external) […]