tagline: Confidence in the Connected World
CIS Logo
Pencil Blog Post: Release: CIS-CAT Pro Dashboard v1.0.5 Arrow See all the latest Arrow

CIS harnesses the power of a global IT community to safeguard public and private organizations against cyber threats.

CIS cover

The Multi-State Information Sharing and Analysis Center (MS-ISAC) is the focal point for cyber threat prevention, protection response and recovery for U.S. State, Local, Tribal and Territorial government entities. CIS is home to the MS-ISAC.
Join Now Arrow

MS ISAC Background Image

Consensus-based Guidelines

CIS Benchmarks and CIS Controls are consensus-based guides curated by security practitioners focused on performance, not profit.

Objective Standards

Our security best practices are referenced global standards verified by an objective, volunteer community of cyber experts.

Secure Online Experience

CIS is an independent, non-profit organization with a mission to provide a secure online experience for all.

Low
Guarded
Elevated
High
Severe

Looking to improve your organization's cybersecurity posture?

Start here with 20 prioritized actions to beat the vast majority of the most common attacks.

CIS Controls Background Image

Need guidance for hardening your IT systems against real threats?

Download our proven CIS Benchmarks to protect over 100 distinct systems & platforms.

CIS Benchmarks Background Image

Struggling to secure your systems and data with limited resources?

CIS SecureSuite Membership gives you instant access to the CIS Controls, full-format CIS Benchmarks, and more.

Sign up today Arrow
CIS SecureSuite Background Image

State, local, tribal or territorial government entity searching for real-time IT security alerts?

Sign up for newsletters, webinars, and advisories.


MS ISAC Background Image

Information Hub

What's New

Benchmark 17 Aug 2017

Blog post 14 Aug 2017

Blog post 11 Aug 2017
Daily tip

Do Not Share Your Password

Passwords are a major defense against hackers, and developing good password practices will help keep your sensitive personal information and identity more secure. Here are some suggestions for developing better passwords:

  • Passwords should have at least eight characters, including uppercase and lowercase letters, numerals, and symbols.
  • Avoid common words; some hackers use programs that try every word in the dictionary.
Click for four more suggestions!