Weekly Tech Tidbit – Secure Remote Access

As I write this on Tuesday, March 24, 2020, I do hope that this message finds you well and staying safe as we all adapt to our new normal under the COVID-19 regulations. We all hope this lasts as short a time as possible. Rest assured that the team at CSI seamlessly transitioned into our remote work environment, and we continue to monitor your networks and respond to your service requests as usual.

Why autocomplete passwords are risky

Many people use auto-fill passwords for their convenience. What you might not know is that hackers and advertisers can use them to get access to websites and other applications and gather sensitive information. Learn more about the risks of using autocomplete passwords. Why auto-fill passwords are so dangerous Certain web browsers have integrated features that […]

Weekly Tech Tidbit – NIST Significantly Changes Password Recommendations

Earlier this month, on March 2, NIST formalized a significant number of changes to its password recommendations as part of the final release of its updated Digital Identify Guidelines document or NIST publication SP 800-63-3.  The full document which includes three additional sister documents (800-63A, 800-63B & 800-63C) is here:

https://csrc.

Weekly Tech Tidbit Extra – VPN Best Practices

As part of our client school district's response for Corona virus preparedness, we see an uptick in requests for VPN access into the school district's networks.  With the potential increase in VPN users and remote connections into your district's systems, we thought now would be a good time to remind you of a few best practices around VPN use:

 

 

Each user should have a unique VPN account, no sharing of ID’s between users or departments.

Weekly Tech Tidbit – How to take the first steps to protect your school district

We have all had at a flood of information come at us in the last nine months regarding ransomware, malware, and cyber security options from all different quarters (cyber-seminars, vendors, various government agencies, and from even yours truly). It is easy to see how one could get a bit lost as to how to decide what the right first step is to improve the security posture of your school district.

3 Hacker types you need to know about

What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who executes a vulnerability test and presents their findings to software vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is […]