Media Mentions
CIS in the news! Read industry articles featuring or referring to CIS.
Featured Media Mention
Flat networks and small cyber budgets left schools vulnerable, but analysts say there’s help
K-12 schools are among the most targeted and least equipped to manage cyberattacks
Read Media Mention281 - 290 of 503 results
Published on 03.03.2020
U.S. National Security Agencies Gather to Combat Potential Election InterferenceNational security professionals are monitoring efforts to counter cyberattacks and foreign disinformation aimed at Super Tuesday presidential pri...
Published on 02.28.2020
RSAC: Election Security Beyond the Ballot BoxGoing a step beyond best practices, there is also an ongoing need to verify that systems are in fact operating as intended on a continuous basis.
Published on 02.24.2020
Russian Interference in 2016 Election Allowed for Better Information SharingKrebs attributes the bolstered collaboration between DHS and the NSA to “the 2016 election” and “interference by the Russians."
Published on 02.20.2020
Ransomware the New Online ‘Nightmare’ for BusinessOrganizations need to understand what information on their networks is sensitive, and encrypt it, or don't have it on the network in the first pl...
Published on 02.13.2020
5 Top Cyber Hygiene Tips to Help Organizations Stay Ahead of Cyber ThreatsBefore establishing a cyber hygiene protocol for your organization, it is important to do an inventory of all of the hardware, software, systems,...
Published on 02.13.2020
100% of Georgia Counties Join Cybersecurity Protection GroupThe EI-ISAC helps the Georgia Secretary of State’s Office and election officials in other states to collect, analyze and disseminate threat data.
Published on 02.11.2020
Hacks on Louisiana Parishes Hint at Nightmare Election ScenarioThe attacks highlight how vulnerable local jurisdictions remain despite four years of efforts to shore up defenses in preparation for the 2020 pr...
Published on 02.08.2020
7 Tips to Create a Hack-Proof Password You’ll Actually RememberRather than creating a new password every 30, 60 or 90 days, NIST now recommends you avoid frequent changes unless it has been compromised.
Published on 01.30.2020
How to Set Up Windows Firewall to Limit Network AccessBy enabling Windows Firewall with the proper settings, you can help shut out attackers and limit lateral movement if a breach occurs.
Published on 01.28.2020
5 Ways Your Organization Can Ensure Improved Data SecurityMobile, the Internet of Things (IoT) and the cloud have dissolved the traditional boundaries of the network. Organizations need to now approach n...
Follow Us!
If you would like to inquire about having a CIS cybersecurity expert attend or speak at your event please send your request to [email protected]