CIS Logo
tagline: Confidence in the Connected World


Securing IoT devices and keeping personally identifiable information (PII) safe and secure these days is of the utmost importance.


The range of current malicious activity attempting to exploit COVID-19 worldwide varies. Learn about a few common examples and what to do to stay safe.


Learn about the risk and rewards of social media for organizations and discover the importance of a social media security policy.


Cyber threat actors (CTA) leverage interest during public health threats and high-profile events to conduct financial fraud and disseminate malware.


Learn about some warning signs to look for and basic precautions you can take to minimize risk and avoid becoming the next tax scam victim!


Any device that connects to the internet is vulnerable and could become compromised. Read on to learn how to 10 tips to securely configure devices.


While it’s clear that businesses are after your dollars during the holidays, you should be aware that cybercriminals are on the lookout, too.


The October 2019 issue of AppSec Advisor focuses on injection attacks. Learn more about their prevalence, cause, and ways to mitigate against them.


This year’s overarching message – "Own IT. Secure IT. Protect IT. "– has been designed to encourage proactive behavior, and promote security best practices.


Online safety begins by talking about it and encouraging safe and smart decisions about online activity. Learn how to keep everyone safe online.


Cybersecurity is a growing industry. Discover the skills needed to be successful in this industry and resources to help with professional development.


Manage your data, and safely dispose of data you don't need.


Learn what you can do to stay cyber-safe when preparing for vacation and how to be secure safely connected throughout your summer trip.


User name and password are no longer sufficient. Using multi-factor authentication can help reduce the risk of online fraud and identify theft


In order to keep information safe or private, we need to take care of sharing it and teach cyber hygiene to those who may not understand its importance.


1 2 3 4