Resources

Teamwork is the Best Defense Against Cyber Crime

Whether you are a sports enthusiast, a volunteer, or part of a work team, you have experienced first-hand the importance of good teamwork. We have all experienced what happens when a team works together, and when a team does not.

Read more

Business Email Compromise – Be Very Afraid

Business Email Compromise (BEC) has become a security buzzword. It simply means using email to attack and gain access to your network. *Phishing* or *Spearphishing* are other terms you will hear. It has been estimated that 70% of the attacks against most sites come from email.

Read more

Welcome Back! We Have Work To Do

Welcome back! It was a very busy summer for all of us. Summer and the start of the school year felt much more “normal” to us. Putting my parent hat on, my youngest’s third-grade teacher approached me and told me she wished she had a classroom full of my daughter.

Read more

Ransomware and Incident Response: How Security Controls Help Districts Reduce Risk and Prepare for Action (and achieve Ed Law 2-d Compliance) – Recording Available

  Speaker: Alan Winchester, Chief Development Officer, Caetra.io Alan Winchester is the Chief Development Officer and creator of CyMetric™. His vision is to enable customers overwhelmed with the issues surrounding legal compliance to meet their obligations intuitively and simply, reducing the need to incur the expenses of consultants and lawyers.

Read more

CSI is pleased to announce that we are an approved reseller under the NCPA Cooperative Purchasing Alliance

Through our partnership with Synnex Corporation CSI is an approved vendor on the NCPA national purchasing contract which is a legal alternative for our public sector and K-12 clients to either the NYS OGS or Federal GSA IT Schedule 70 contracts.NCPA (National Cooperative Purchasing Alliance) NCPA  is a leading national government purchasing cooperative working to […]

Read more

NIST Cybersecurity Framework – Malware Defenses

  This week I would like to talk to you about Malware Defenses. This topic is in the NIST Detect and Protect categories. Antivirus has been around for what seems like forever. However, as long as antivirus has existed, we have had the problem with getting it on “all” servers and “all” endpoints.

Read more

NIST Cybersecurity Framework – Software Inventory

  As mentioned in last week’s Tech Tidbit, we have begun a new series of weekly bulletins sent to School Business Officials giving them more information on the changing Cybersecurity landscape and how the NIST Cybersecurity Framework can help them increase their security while complying with the Ed Law 2-d guidelines.

Read more

NIST Cybersecurity Framework – Recover

  This week I’d like to talk a little bit about the NIST Category – Recover. According to NIST, the Recover Category “identifies appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident.

Read more

NIST Cybersecurity Framework – Respond

In last week’s email, we talked about the third NIST Cybersecurity Framework category – Detect. This week we will be discussing the fourth category – Respond. As with Protect, the general idea of Respond seems pretty clear-cut.

Read more

NIST Cybersecurity Framework – Detect

In last week’s email, we talked about the second NIST Cybersecurity Framework category – Protect. This week we will be discussing the third category – Detect. Detection seems like it should be pretty straightforward.

Read more

NIST Cybersecurity Framework – Protect

In last week’s email, we talked about the first NIST Cybersecurity Framework category – Identify. This week we will be discussing the second category – Protect. The idea of protecting yourself and your network is pretty straightforward general concept.

Read more