CIS Logo
tagline: Confidence in the Connected World


Web applications are database driven in order to store user preferences, personally identifiable information, and other sensitive user information.


Learn through an infographic on just how far CIS has taken the CIS Controls through upgrading and advancing over the past few years.


Check out the 2016/2017 artwork from the K-12 contest winners of our annual Kids Safe Online poster contest for National Cyber Security Awareness Month.


This guide contains cybersecurity initiatives, along with detailed recommendations that IT professionals can reference in their organizations or business.


Disaster preparation should include protecting cyber assets. MS-ISAC is providing the following recommendations to aid entities in protecting cyber assets.


Patching and updating systems is one of the most important cybersecurity procedures to implement in order to protect a system from being compromised.


Cryptography is a method used to encrypt, or scramble, the contents of a file in such a way that only those with specific knowledge can read them.


The Internet is comprised of 2 sections: the searchable Internet, sometimes called the “surface web” or “clearnet,” and a network known as the “deep web."


CIS is here to remind you that whether traveling for business or leisure, travelers face increased cyber targeting and exposure during their trips.


Cyber threat actors utilize phishing emails to compromise systems and networks and/or gather information using social engineering techniques.


In Tech Support Call Scams a malicious actor, claiming to work for a well-known company, cold-call victims to convince them their computer is under attack.


Cyber-criminals target online bank account credentials, as well as information for credits cards and other payment information.


Malicious actors release login credentials from compromised databases. Learn how to secure your login credentials with these simple tips from MS-ISAC.


CIS is here to help you secure your personal social media accounts with these tips from the MS-ISAC, lock up your personal data and stay safe while sharing.


A Telephony Denial of Service (TDoS) attack attempts to make a telephone system unavailable to the intended user by preventing incoming or outgoing calls.


1 4 5 6 7 8