AI is changing the entire cyber threat landscape, even in your classrooms. That’s why this year’s Cybersecurity Event is all about how AI impacts school data privacy and what districts can do to stay ahead. For our 10th anniversary, we’re bringing together thought leaders and district innovators for a full day of strategies, stories, and solutions you […]
10 years of cybersecurity insights. One unmissable day.
Tech Tidbit – About Protecting Your Macs
I remember those days when the Apple folks would scoff at having to have antivirus. Macs were superior, and Windows devices had all those problems. The technical folks knew that was marketing blather vs. sound security advice. The reality has always been that “everything can be hacked.
Webinar: Protect yourself, protect your patients – Recording available
Webinar: Protect Yourself, Protect Your Patients Failure to abide by HIPAA standards for technology compliance for ePHI can expose your practice to significant financial penalties. CSI’s webinar entitled, “Protect yourself, protect your patients” is designed for administrative and/or technical staff of healthcare providers.
March 4th Webinar: Protect Yourself, Protect Your Patients Copy
March 4th Webinar: Protect Yourself, Protect Your Patients Failure to abide by HIPAA standards for technology compliance for ePHI can expose your practice to significant financial penalties. CSI’s March 2014 webinar entitled, “Protect yourself, protect your patients” is a free knowledge transfer session on Tuesday March 4th from 10AM-11AM. This session is designed for administrative and/or technical staff of healthcare providers.
Why CSI is different
At CSI we are constantly reading, learning, evaluating, and training on the latest technologies and best practices. I personally read at least 1,000 pages a week of technical journals, including emails and technical posts from some of the best minds and subject matter experts in our industry on new technology, problems with existing technology, solutions […]
Do you really know what is going on with your network?
I often ask the question to my staff and to vendors, “How do I know what I don’t know?”. By that I mean how do I find out about devices that are broken or performing poorly on our client’s computer networks?
