“Reality is merely an illusion, albeit a very persistent one.” -Albert Einstein “You live in a world of illusion Where everything’s peaches and cream. We all face a scarlet conclusion, But we spend our time in a dream.” -Jungle Love, Steve Miller Band Ignorance is not bliss when it comes to network security.
Today’s cyber landscape feels a lot like this picture. Anyone who uses a device connected to the internet is under threat. You never know when that arrow with your name will find you. Do you have the armor you need to give you the best chance of survival when the arrow finds you? Medieval warriors […]
You arrive at work tomorrow and are greeted by the news that a cyber-attack has compromised your district’s network, and the network is unavailable. What is the first thing you do? What is the second? When confronted by such alarming news, most people would be overwhelmed and unsure of the next steps.
I read the other day that today is “Worldwide Backup Awareness Day.” I have no idea who declares these days. I am guessing you already know you should have good backups and air-gapped backups. However, I am taking the liberty of morphing this into more sophisticated forms of backups.
Here is my “Top 5” list to up your cybersecurity defenses: Make sure that whatever your current endpoint protection strategy is, it is 100% in place. There are always better tools. However, repeatedly, the attackers are exploiting gaps in your cyber defenses.
Welcome back! This summer flew by, and my summer vacation seems like a distant memory. In my 44 years of helping schools open for the new school year, this one was different. Several districts suspended all major work the last week of August. This was a summer of busy projects.
A year ago, my very short wife sat in a restaurant during March Madness on a bar stool that was too tall for her. The result was that while getting down off the stool, she blew out a disk in her back and was in tremendous pain. We went to a local ortho walk-in clinic.
You already know that “all” in security protection is vitally important. You need all your endpoints and servers protected with something. Hopefully, that something is EDR, MDR, and XDR products like CSI’s CSEDR powered by SentinelOne, CSMDR powered by Blackpoint plus SentinelOne, or CSI’s Managed XDR service powered by BlueShift Cybersecurity.
You have probably heard of the AT&T breach by now. Reports describe it as the largest breach in history with serious national security consequences. AT&T has reported that threat actors stole all client call and text records for six months. I have not read anything indicating that the threat actors know the contents of any […]
“Trust but verify.” -President Ronald Reagan, December 8th, 1987, at the Intermediate-Range Nuclear Forces (INF) Treaty Signing I watched a presentation the other day by the head of Threat Operations for a major Security Operations Center (SOC) that provides 24/7 security oversight over networks like yours.