Please join us on Wednesday, March 8th, as Scott Quimby delivers a special update addressing the current K-12 cybersecurity challenges, NIST Cybersecurity Framework (CSF) alignment as it relates to Ed Law 2-d, and NEW actions to improve your district’s security posture, help you with documentation, and measure your technology teams productivity.
It seems like Cyber Attacks are happening everywhere these days. Whether it’s a national news report of an attack against a company that has your credit card information or local news reporting a school district like yours that’s been hit with a ransomware/data breach, these stories are plentiful.
Scott Quimby discusses the following: Reading DMARC reports – In preparation for achieving DMARC Quarantine status, Scott will walk you through reading DMARC reports and look at what they mean and what actions are required based on the data.
The first session will be led by Scott Quimby, CISSP, Vice President and CTO of CSI. He will focus on “Tech Tidbits” providing timely informational updates on industry news and cybersecurity issues impacting the K-12 environment. Watch it here × Please fill the form below
Join us, as Jeff Pigula, CSI Senior Network Engineer (Cisco CCNA and CC-NSF) will be discussing the changing world of PoE power management – what you need to know to keep from being driven crazy with the proliferation of new PoE devices being added to your network.
It has been reported that when attackers breach your network, they often first go after your backups in an attempt to corrupt them so that you have no option to get your data back but to pay the ransom. I recently saw some statistics that when they gain access to the backups, they are at […]
You all may have heard Scott talking about “those ex-NSA guys at Huntress” he talks to. Bob and Scott have been stressing the importance of layers of security for proper cyber defense for many years now. CSI uses Huntress on all Windows machines.
Speaker: Alan Winchester, Chief Development Officer, Caetra.io Alan Winchester is the Chief Development Officer and creator of CyMetric™. His vision is to enable customers overwhelmed with the issues surrounding legal compliance to meet their obligations intuitively and simply, reducing the need to incur the expenses of consultants and lawyers.
Mitre Engenuity has released its 2022 fully independent evaluation of 30 of the most common cybersecurity endpoint protection platforms. Why does this matter? The 2022 assessment and results are particularly interesting because the payload they used is the most common, and nefarious, ransomware and malware variants in use today.
“Just when you thought it was safe to go back in the water…” ― Peter Benchley, Jaws It is a scary world out there. We know that upwards of 70% of network breaches start with phishing attacks coming from emails.