Resources

Your Weekly Tech Tidbit…Beware of “Zombies”

  “A chain is only as strong as its weakest link” -Thomas Reid, “Essays on the Intellectual Powers of Man” – 1786 The SolarWinds Orion hack has been in the news for months now. It is now alleged that an “intern” put a very weak, easily crackable password on a critical system and then copied […]

Read more

Your Weekly Tech Tidbit… NIST Data Recovery

  Today’s NIST topic is data recovery. The most obvious example of meeting this NIST standard is maintaining good backups. This is something we have all been doing forever, but as long as we have done it, I constantly see the same issues over and over.

Read more

Your Weekly Tech Tidbit… Taking a look at NIST controls

  Today we continue our look at a series of practical steps that districts can use to increase their NIST compliance. Looking at the complete set of NIST controls can be a daunting experience. One of the best ways we have found to make these cybersecurity improvements more attainable is following the CIS Controls Top […]

Read more

Your Weekly Tech Tidbit… Email and Web Browser Protection

  Today we continue our look at a series of practical steps that districts can use to increase their NIST compliance. Looking at the complete set of NIST controls can be a daunting experience. One of the best ways we have found to make these cybersecurity improvements more attainable is following the CIS Controls Top […]

Read more

Your Weekly Tech Tidbit…NIST Stable Security Updates

    Today we continue our look at a series of practical steps that districts can use to increase their NIST compliance. Looking at the complete set of NIST controls can be a daunting experience. One of the best ways we have found to make these cybersecurity improvements more attainable is following the CIS Controls […]

Read more

Your Weekly Tech Tidbit… NIST Configuration Standards

  Today we continue our look at a series of practical steps that districts can use to increase their NIST compliance. Looking at the complete set of NIST controls can be a daunting experience. One of the best ways we have found to make these cybersecurity improvements more attainable is following the CIS Controls Top […]

Read more