To what this recording click here. × Please fill the form below

To what this recording click here. × Please fill the form below
CSI is growing again. We are looking for high-quality individuals to work with our service delivery team. For more information on the positions available please click here.
CSI is growing again. We are looking for high-quality individuals to work with our service delivery team. For more information on the positions available please click here.
CSI is growing again. We are looking for high-quality individuals to work with our service delivery team. For more information on the positions available please click here.
Just when you thought it was safe to move along to other technical topics, along comes Scott Quimby’s Hardening Active Directory Part III to scare you even more. If you haven’t watched Part I and Part II, you can find them here. In Part III we will do a little review of some core topics […]
We are so focused on our networks being breached and the bad guys gaining a foothold to steal our money and personally identifiable information that we often forget is that we as techs can make mistakes and inadvertently give away access to sensitive/confidential parts of the network.
The reality is that your network is under attack. We need to protect our servers. We need to protect our data. One way we do that is by not remoting into servers to do basic tasks. Almost everything we need to do, we can now do remotely. Also, we can do many tasks with a […]
It is important to have accountability to the taxpayers independently proving that each school district has adequate financial controls in place and is properly managing the money it has been entrusted. In this era of identity theft, ransomware, and electronic financial theft, it is equally important to have adequate technical controls in place to protect […]
I can’t tell how many times I have heard from non-technical Mac people that, “they don’t need anti-virus.” The Apple person that sold them their Mac told them that. I have pointed out that Apple’s technical folks make a strong recommendation for anti-virus in their technical documents despite sales claims to the contrary.
We have to be constantly vigilant to prevent malware, trojans, and other bad actors from taking root in our school networks to steal personally identifiable information (PIA) and money. Besides web filtering, antivirus, patching, and now advanced endpoint protection, we also have to look at policies.
Recent Comments