Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

Information can easily be lost or compromised due to an equipment malfunction, an error, or a virus Schedule automatic backups of your information on

You may find that an infection has affected your computer so much that the operating system and applications need to be reinstalled In cases like

Be careful when installing apps on your mobile device Many apps want more permissions than are actually needed for their function For example, some

Billions of people use the Internet every single day, and knowing how to stay safe while using it is vital Always be sure to verify the sites you

Social networking platforms (such as Facebook, Twitter, Instagram, and Snapchat) are used by billions of people each day It's important to

Cyber-criminals can (and do) take advantage of vulnerabilities on every operating system, including Mac OS, Microsoft Windows, and distributions of

Tips to Better Secure Your Wireless Network Change your network name and the default password Encrypt the data on your network Make sure

Simple Tips to Keep Your Mobile Device Secure Keep software up-to-date If a vendor releases updates for the software operating your device,

Laptops have become a vital tool for both business and personal use, and the portability of laptops makes them extremely convenient However, we

ATM skimmers are devices that criminals place over or on ATM machines to steal your card information, including your personal identification number

Never clearly identify your home network by using your name or apartment number If your home network is named "John Smith's home" or "Apt 2B," then

It's important to erase all personal information from old computers before disposing of them Simply reformatting a hard drive or reinstalling the

Many websites ask for your personal information and collect tracking details as you move from page to page This information is used to personalize

1 2 3