×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

Secure Your Organization


Secure Specific Platforms


U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

Secure Your Organization


Learn


Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



There are many free services available today You can store pictures in the cloud, develop documents, send email, and connect with people - all



Scammers keep developing new tricks to try to snag money from users, and the newer types of tricks involve the use of ransomware The scammers infect



Don't put yourself in danger Never use social media to share when you're on vacation, or when you "check-in" to your favorite meeting place Doing



Passwords are a major defense against hackers, and developing good password practices will help keep your sensitive personal information and identity



Protecting confidential and sensitive data from accidental disclosure is very important Always strive to properly handle data erasure and the



After you have installed an anti-virus and/or anti-spyware package, you should scan your entire computer periodically If your anti-virus package has



Safeguarding your business and personal data has never been more difficult or more important How do you safeguard sensitive/confidential data The



Children present unique security risks when using a computer and often need advice, guidance, and protection Talk to your children and let them know



It's important to secure all portable devices to protect both the device and the information contained on the device Ways to Protect Mobile



Cyber-criminals often use current news, sensational topics, and promises of shocking photos and video to get you to click on malicious links Don't



With the increased volume of online shopping, it's important that consumers understand the potential security risks and know how to protect



The term "cybercrime" is usually referred to as any criminal offense committed against or with the use of a computer or computer network A cybercrime



"Cyberbullying" refers to the new and growing practice of using technology to harass, or bully, someone else Cyberbullying can range in severity from



In simplest terms, cloud computing is a subscription-based or free service where you can obtain networked storage space and other computer resources



Rogue software, or "scareware," is fake antivirus or security software Bad guys usually try to get you to install it by generating a pop-up window as



1 2 3