×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Here is a record of the proclamation for the State Governors to make in support of National Cyber Security Awareness Month.


Two-Factor Authentication
September 1, 2016
Two-factor authentication is an important layer of defense beyond your password. It decreases your risk of falling victim to a compromise.


Learn how levels of government can get smarter on how they respond to cyber threats.


Back to School
August 1, 2016
Cybersecurity tips from CIS to stay safe while heading back to school and connecting your new devices and networks on the first day.


Large events such as the Olympic Games hold potential value for those looking to prey upon the attraction of the games to perpetrate cyber fraud schemes.


Summer is finally here and for many of us that means it’s time to get away! It’s not surprising that many cyber criminals target travelers.


President Barack Obama signed the Cybersecurity Information Sharing Act of 2015 (CISA) into law on December 18, 2015. Learn about the details here.


Learn about the underlying assumptions IoT devices make, common methods they utilize to communicate, and what type of information is at risk.


When it comes to email, we've all come across a phishing email that appeared to be legitimate. Use our tips to help you spot and report them.


Cybersecurity experts continually identify the use of strong, unique passwords as one of their top recommendations in protecting against potential threats.


It’s tax season, which means it’s also time for tax scams. Some tax scams occur when fraudulent tax returns are filed in the victim’s name.


A data breach is the intentional or unintentional release of information into an untrusted environment, which could lead to lost and compromised data.


The White House’s Office of Management and Budget released a new policy requiring all publicly accessible Federal websites & web services to use the HTTPS.


Counties should take every precaution in efforts to prevent and mitigate the effects of cyber attacks. See our county-focused cybersecurity recommendations.


1 15 16 17