A few years ago, in a Tech Talk I talked about a major college that suffered a complete network lockout due to a soda machine that introduced malware into the network that sought out all the default passwords on their devices and locked out an estimated 5,000 devices that each had to be manually […]
You all may have heard Scott talking about “those ex-NSA guys at Huntress” he talks to. Bob and Scott have been stressing the importance of layers of security for proper cyber defense for many years now. CSI uses Huntress on all Windows machines.
This month we talked about how the Ukraine situation affects the cybersecurity landscape for the US and what it means for network security. Leading this discussion was Jason Whitehurst, a cybersecurity professional of over 20+ years, and Vince Crisler, former White House CISO and DarkCubed founder and CEO. Scott Quimby had the opportunity to listen […]
Speaker: Alan Winchester, Chief Development Officer, Caetra.io Alan Winchester is the Chief Development Officer and creator of CyMetric™. His vision is to enable customers overwhelmed with the issues surrounding legal compliance to meet their obligations intuitively and simply, reducing the need to incur the expenses of consultants and lawyers.
Mitre Engenuity has released its 2022 fully independent evaluation of 30 of the most common cybersecurity endpoint protection platforms. Why does this matter? The 2022 assessment and results are particularly interesting because the payload they used is the most common, and nefarious, ransomware and malware variants in use today.
CSI is growing again. We are looking for high-quality individuals to work with our service delivery team. For more information on the positions available please click here.
“Just when you thought it was safe to go back in the water…” ― Peter Benchley, Jaws It is a scary world out there. We know that upwards of 70% of network breaches start with phishing attacks coming from emails.
You can easily block these applications from getting on your endpoints Here’s a quick Tech Tidbit: Configure your “Potentially Unwanted Applications” (PUA) settings in Windows Defender. Hopefully you kept Windows Defender on each workstation and server regardless of what your primary antivirus or EDR type security product is.
Keep your browser extensions limited to those you need to support the district and trust “There is a snake in my boot” – Woody, Toy Story When I was whitewater rafting down the Colorado River through the Grand Canyon, our guides warned us to shake out our shoes/boots before we put them on in […]
“I am watching you…Always watching” -Roz Monsters Inc. For New Year’s we once again had a holiday crisis. Fortunately, this wasn’t an attack. Microsoft had a 2022 date bug in Exchange that totally shut down the on-premise Exchange server’s ability to send emails worldwide.
Recent Comments