Please join us *tomorrow – Wednesday, October 12th* for an upcoming webinar focusing on Business Email Compromise. Jason Whitehurst, a cybersecurity professional, will be speaking about the significant increase in business email compromises for school systems.
“None shall pass” -The Black Knight “Monty Python and the Holy Grail” Today I would like to challenge you to “test two aspects of your network backups. Most of you have never done this because yPreview (opens in a new tab)ou are “too busy putting out fires”. It is summer.
A few years ago, in a Tech Talk I talked about a major college that suffered a complete network lockout due to a soda machine that introduced malware into the network that sought out all the default passwords on their devices and locked out an estimated 5,000 devices that each had to be manually […]
You all may have heard Scott talking about “those ex-NSA guys at Huntress” he talks to. Bob and Scott have been stressing the importance of layers of security for proper cyber defense for many years now. CSI uses Huntress on all Windows machines.
This month we talked about how the Ukraine situation affects the cybersecurity landscape for the US and what it means for network security. Leading this discussion was Jason Whitehurst, a cybersecurity professional of over 20+ years, and Vince Crisler, former White House CISO and DarkCubed founder and CEO. Scott Quimby had the opportunity to listen […]
Speaker: Alan Winchester, Chief Development Officer, Caetra.io Alan Winchester is the Chief Development Officer and creator of CyMetric™. His vision is to enable customers overwhelmed with the issues surrounding legal compliance to meet their obligations intuitively and simply, reducing the need to incur the expenses of consultants and lawyers.
Mitre Engenuity has released its 2022 fully independent evaluation of 30 of the most common cybersecurity endpoint protection platforms. Why does this matter? The 2022 assessment and results are particularly interesting because the payload they used is the most common, and nefarious, ransomware and malware variants in use today.
CSI is growing again. We are looking for high-quality individuals to work with our service delivery team. For more information on the positions available please click here.
“Just when you thought it was safe to go back in the water…” ― Peter Benchley, Jaws It is a scary world out there. We know that upwards of 70% of network breaches start with phishing attacks coming from emails.
You can easily block these applications from getting on your endpoints Here’s a quick Tech Tidbit: Configure your “Potentially Unwanted Applications” (PUA) settings in Windows Defender. Hopefully you kept Windows Defender on each workstation and server regardless of what your primary antivirus or EDR type security product is.
Recent Comments