×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Information can easily be lost or compromised due to an equipment malfunction, an error, or a virus Schedule automatic backups of your information on



You may find that an infection has affected your computer so much that the operating system and applications need to be reinstalled In cases like



Be careful when installing apps on your mobile device Many apps want more permissions than are actually needed for their function For example, some



Billions of people use the Internet every single day, and knowing how to stay safe while using it is vital Always be sure to verify the sites you



Social networking platforms (such as Facebook, Twitter, Instagram, and Snapchat) are used by billions of people each day It's important to



Cyber-criminals can (and do) take advantage of vulnerabilities on every operating system, including Mac OS, Microsoft Windows, and distributions of



Tips to Better Secure Your Wireless Network Change your network name and the default password Encrypt the data on your network Make sure



Simple Tips to Keep Your Mobile Device Secure Keep software up-to-date If a vendor releases updates for the software operating your device,



Laptops have become a vital tool for both business and personal use, and the portability of laptops makes them extremely convenient However, we



ATM skimmers are devices that criminals place over or on ATM machines to steal your card information, including your personal identification number



Never clearly identify your home network by using your name or apartment number If your home network is named "John Smith's home" or "Apt 2B," then



It's important to erase all personal information from old computers before disposing of them Simply reformatting a hard drive or reinstalling the



Many websites ask for your personal information and collect tracking details as you move from page to page This information is used to personalize



1 2 3