Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

There are many free services available today You can store pictures in the cloud, develop documents, send email, and connect with people - all

Scammers keep developing new tricks to try to snag money from users, and the newer types of tricks involve the use of ransomware The scammers infect

Don't put yourself in danger Never use social media to share when you're on vacation, or when you "check-in" to your favorite meeting place Doing

Passwords are a major defense against hackers, and developing good password practices will help keep your sensitive personal information and identity

Protecting confidential and sensitive data from accidental disclosure is very important Always strive to properly handle data erasure and the

After you have installed an anti-virus and/or anti-spyware package, you should scan your entire computer periodically If your anti-virus package has

Safeguarding your business and personal data has never been more difficult or more important How do you safeguard sensitive/confidential data The

Children present unique security risks when using a computer and often need advice, guidance, and protection Talk to your children and let them know

It's important to secure all portable devices to protect both the device and the information contained on the device Ways to Protect Mobile

Cyber-criminals often use current news, sensational topics, and promises of shocking photos and video to get you to click on malicious links Don't

With the increased volume of online shopping, it's important that consumers understand the potential security risks and know how to protect

The term "cybercrime" is usually referred to as any criminal offense committed against or with the use of a computer or computer network A cybercrime

"Cyberbullying" refers to the new and growing practice of using technology to harass, or bully, someone else Cyberbullying can range in severity from

In simplest terms, cloud computing is a subscription-based or free service where you can obtain networked storage space and other computer resources

Rogue software, or "scareware," is fake antivirus or security software Bad guys usually try to get you to install it by generating a pop-up window as

1 2 3