×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Malicious actors release login credentials from compromised databases. Learn how to secure your login credentials with these simple tips from MS-ISAC.


CIS is here to help you secure your personal social media accounts with these tips from the MS-ISAC, lock up your personal data and stay safe while sharing.


A Telephony Denial of Service (TDoS) attack attempts to make a telephone system unavailable to the intended user by preventing incoming or outgoing calls.


Every year, unfortunate taxpayers go to file their returns and are shocked to find that someone else has filed a fraudulent one in their name!


During NSCAM the MS-ISAC conducts a national K-12 "Kids Safe Online" poster contest to encourage young people to use the Internet safely and securely.


It’s tax season, which means it’s also time for tax scams. Some tax scams occur when fraudulent tax returns are filed in the victim’s name.


1 12 13 14