• To ensure you get the most out of your CIN membership and stay connected with the latest updates, we are asking all members to update their community profiles. Please take a few moments to log in and: • Complete all sections of your profile • Review your current information for accuracy • Enter an alternative email address if desired (CIN requires your valid business email address for your training organization). Keeping your profile up to date helps us better serve you, ensures your account is correctly linked with CompTIA’s CRM, streamlines processes, enhances communication, and guarantees you never miss out on valuable CIN opportunities. Thank you for taking this important step! step!

Search results

  1. Trevor Chandler

    Email Content

    This Microsoft Defender does everything! Thank you sir!!!
  2. Trevor Chandler

    Cybersecurity Frameworks: NIST vs. CIS

    I'm gonna have to give this one a lot of thought. I'll have to get back to you later!
  3. Trevor Chandler

    Cybersecurity Frameworks: NIST vs. CIS

    You didn't ask me, but I say it depends!
  4. Trevor Chandler

    Chinese Hackers Accessed US Treasury Workstations

    Too relaxed - like on Bourbon street in New Orleans :-( It's unfortunate, but you almost just can never let your guard down!!! That comment "It's not a matter of if, but when" applies to all levels of the public sector! The U.S. Treasury? My goodness!!!!
  5. Trevor Chandler

    Chinese Hackers Accessed US Treasury Workstations

    China may not deny, but they sure ain't gonna admit any involvement either!!! Love your commentary!!!!
  6. Trevor Chandler

    Email Content

    Many, many, many thanks Emmanuel!!!
  7. Trevor Chandler

    Creating a Positive Learning Environment in IT Classes

    There's something camaraderie that just works!!!! And let me thank you again for your usual kind and considerate words!!!!
  8. Trevor Chandler

    Creating a Positive Learning Environment in IT Classes

    The idea you make reference to is not the use of a hammer is it P-)
  9. Trevor Chandler

    Email Content

    Hello CINners, Does anyone know if there is a tool that can scan an entire email, for potentially malicious content? Thanks CINners
  10. Trevor Chandler

    Chinese Hackers Accessed US Treasury Workstations

    Chinese Hackers Accessed US Treasury Workstations in ‘Major’ Cybersecurity Incident Chinese hackers remotely accessed US Treasury Department workstations and unclassified documents after compromising a cloud-based service operated by BeyondTrust, the department said Monday. Happy 2025 to...
  11. Trevor Chandler

    Improving Retention of Key IT Concepts

    I'd love to see how the Magic Number is used here :)
  12. Trevor Chandler

    Reinventing Security Awareness: Key Focus for 2025

    With phishing being the #1 attack vector, it definitely commands priority attention. With passwords being the primary means of users authenticating into almost every portal, it commands that same level of attention as phishing. I'd modify the wording of your question a little bit because...
  13. Trevor Chandler

    Email - Sent to Spam/Junk

    Elevated learning is what I've come to expect when I put a question out in the community, and I've yet to be disappointed - thanks to precious!!!
  14. Trevor Chandler

    Security vs. Privacy: Which Should Take Precedence?

    A balance - I totally agree!!!!
  15. Trevor Chandler

    Email - Sent to Spam/Junk

    Hello CINners, We know that some of the factors that can/will cause email to be sent to the Spam or Junk folder are: - Spam trigger words: - Suspicious links or attachments: - Poor sender reputation: - Incorrect email authentication: - High volume of emails: - Unusual email formatting: -...
  16. Trevor Chandler

    Making Subnetting Fun and Easy

    I totally agree!!! Being able to post a question out here, and receive a high-level response, that will save me days of research, is truly a testament to this community being, as you say, such a great place!!!
  17. Trevor Chandler

    Security vs. Privacy: Which Should Take Precedence?

    A sacrifice of privacy is the price we pay for the luxury of digital privilege!!! No more having our cake, and eating too!!!
  18. Trevor Chandler

    Creating a Positive Learning Environment in IT Classes

    Outside of those community members that employ the use of mace, and CAT5 of Nine Tails, you shouldn't have any challenge in getting the majority of the community to agree on coffee for the study session!!!
  19. Trevor Chandler

    Connecting Technical Skills with Business Needs

    I say again, you're too kind - I'm honored!!!