CIS Logo
tagline: Confidence in the Connected World


EOS occurs when software updates, patches, and other support are no longer offered, resulting in software becoming prone to future security vulnerabilities.


Some traditional cyber-criminals have seemingly left the art of stealing credit cards and personally identifiable information (PII) for a simpler tactic.


Use our survival guide to make sure you're not putting your personal information at risk while taking advantage of great deals.


Planning to get a head start on your holiday shopping this year? Here are four things you need to know to stay safe while shopping online.


The ultimate goal of CIS Control 5 is to protect your organization’s information and assets from theft and misuse on all devices not just computers.


Week 4 of National Cyber Security Awareness Month focuses on our continuously connected lives in a rapidly developing digital world.


Cybercriminals routinely leverage vulnerabilities and misconfigurations in software, servers, printers, and devices to gain access to systems.


Tech support scams have been around for years: you answer the phone and the person on the other end claims to be working with a well-known tech company.


Configuration management ensures that the software and devices running on the network are current, trusted and secure.


Referred to as “Billion Dollar Scam” by the FBI, Business Email Compromise (BEC) scammers use a spoofed email to trick employees into transferring money.


The insider poses a threat because the legitimate access they have to proprietary systems discounts them from facing traditional cybersecurity defenses.


Breaches are widely observed in the healthcare sector and can be caused by many different types of incidents, including credential-stealing malware.


Distributed denial of service (DDoS) attacks pose a serious problem for healthcare providers who need access to the network to provide proper patient care.


Ransomware is malware that infects systems making them inaccessible until ransom is paid. In the healthcare industry critical processes become inoperable.


Inventory management can be challenging for any organization, but you can’t protect your systems unless you know what’s running on them.


1 13 14 15 16 17