Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

  Now that we are into tax season, scammers are looking to steal tax documents, file fraudulent returns in victims’ names, and extort payment

Don't put yourself in danger by updating social media and sharing while you are away from home Wait until you get back By revealing such specifics

When visiting unknown websites, be vigilant about protecting your identity Remember that some information is automatically made visible to the site

Anti-virus (AV) software scans files for certain patterns or signatures of known viruses Virus authors continually release new and updated viruses,

Never share your personal information with just anyone Your Social Security number, credit card numbers, and bank account numbers can be used to

Phishing scams continue to proliferate at alarming rates and are becoming more and more difficult to detect It's important for you to understand how

Don't leave your computer vulnerable Keep your systems patched and up-to-date with the latest security patches from vendors Doing so will help

You don’t need fame or millions of dollars in the bank to become the victim of cybercrime Many cyber-criminals rely on automated attacks that seek

Any website can be compromised, so stick with reputable online stores, news, and entertainment sites Be sure to check the status bar at the bottom

Once information is online, sometimes it can be impossible to remove Therefore, you should be conscientious of your visible online presence, also

Using a public wi-fi network not only puts your personal devices at risk, but also exposes your traffic to everyone else using the same network

Peer-to-peer (P2P) networking is a popular method for sharing files, music, photographs, and other information Just remember that this method can

"Cyber ethics" refers to the code of responsible behavior on the Internet Just as we are taught to act responsibly in everyday life with lessons such

We've all seen the pop-up windows telling us that our computer is infected with a virus or other malware Don't be fooled; the real malware could be

With major data breaches being reported all too frequently, organizations are now placing increased emphasis on the security of personal, private,

1 2 3