Please join us *tomorrow – Wednesday, October 12th* for an upcoming webinar focusing on Business Email Compromise. Jason Whitehurst, a cybersecurity professional, will be speaking about the significant increase in business email compromises for school systems.
Protect Your District from Business Email Compromise

Weekly Tech Tidbit – I challenge you to prove your backups work
“None shall pass” -The Black Knight “Monty Python and the Holy Grail” Today I would like to challenge you to “test two aspects of your network backups. Most of you have never done this because yPreview (opens in a new tab)ou are “too busy putting out fires”. It is summer.

Weekly Tech Tidbit – The attack of the Smart TVs
A few years ago, in a Tech Talk I talked about a major college that suffered a complete network lockout due to a soda machine that introduced malware into the network that sought out all the default passwords on their devices and locked out an estimated 5,000 devices that each had to be manually […]

Why Huntress Should Be Added To Your Security Stack – Recording Available
You all may have heard Scott talking about “those ex-NSA guys at Huntress” he talks to. Bob and Scott have been stressing the importance of layers of security for proper cyber defense for many years now. CSI uses Huntress on all Windows machines.
Special Session with the former White House CISO about the Ukraine War – Recording Available
This month we talked about how the Ukraine situation affects the cybersecurity landscape for the US and what it means for network security. Leading this discussion was Jason Whitehurst, a cybersecurity professional of over 20+ years, and Vince Crisler, former White House CISO and DarkCubed founder and CEO. Scott Quimby had the opportunity to listen […]

Ransomware and Incident Response: How Security Controls Help Districts Reduce Risk and Prepare for Action (and achieve Ed Law 2-d Compliance) – Recording Available
Speaker: Alan Winchester, Chief Development Officer, Caetra.io Alan Winchester is the Chief Development Officer and creator of CyMetric™. His vision is to enable customers overwhelmed with the issues surrounding legal compliance to meet their obligations intuitively and simply, reducing the need to incur the expenses of consultants and lawyers.

A discussion of MITRE ENGENUITY 2022 independent testing results – Recording Available
Mitre Engenuity has released its 2022 fully independent evaluation of 30 of the most common cybersecurity endpoint protection platforms. Why does this matter? The 2022 assessment and results are particularly interesting because the payload they used is the most common, and nefarious, ransomware and malware variants in use today.

CSI is hiring. Come join our growing family!
CSI is growing again. We are looking for high-quality individuals to work with our service delivery team. For more information on the positions available please click here.

Improve the Reliability of Email Delivery the First and Every Time – Recording Available
“Just when you thought it was safe to go back in the water…” ― Peter Benchley, Jaws It is a scary world out there. We know that upwards of 70% of network breaches start with phishing attacks coming from emails.

Tech Tidbit – Potentially Unwanted Applications (PUA)
You can easily block these applications from getting on your endpoints Here’s a quick Tech Tidbit: Configure your “Potentially Unwanted Applications” (PUA) settings in Windows Defender. Hopefully you kept Windows Defender on each workstation and server regardless of what your primary antivirus or EDR type security product is.