Imagine you’ve been hit by a Cyber Attack. Your network is locked by ransomware and all your data is compromised. What now? Many people rely on their backups as a way to restore their data.

Cyber Attack – Are you as protected as you think you are? (Part Five – Disaster Recovery)

Cyber Attack – Are you as protected as you think you are? (Part Four – Multi-Factor Authentication (MFA)
In August of 2021, CISA added “Single Factor Authentication” to its list of practices it considers “exceptionally risky” as it exposes you to an “unnecessary risk from threat actors”. As a result, you may start to see requests from multiple sources to implement multi-factor authentication (MFA) strategies.

Tech Tidbit – Ransomware Presentation Tidbits
I watch a lot of Cybersecurity presentations. Ransomware is on everyone’s lips as a major concern. Here are two interesting tidbits of information. Many Law Enforcement Agencies and CyberSecurity Analysts are now recommending that if you don’t pay the ransom, you keep your encrypted data and backups anyway.

Cyber Attack – Are you as protected as you think you are? (Part Three – Firewall Health)
Today’s Internet and network security environment is very different from what it was just a few short years ago. As we’ve discussed, legacy tools, basic firewalls, and basic anti-virus/malware are no longer sufficient to keep your network safe.

Chaos or Teamwork?
Have you ever been part of a group where a leader has not been clearly identified? It takes twice as long to get anything done and arguing and conflict are the order of the day. Cybersecurity in your district works the same way.

Cyber Attack – Are you as protected as you think you are? (Part Two – Patching)
Everyone knows the adage “No one is perfect”. Unfortunately for anyone with a computer network, the bad actors who want to infiltrate your system are ready to take full advantage of any mistake they can find. Cyber security is a constant competition between software/code developers and bad actors.

Cyber Attack – Are you as protected as you think you are? (Part One-Malware Protection)
Last week we talked about how one weak link can open the door to a Cyber Incident. We discussed the weak link of old, unused user IDs remaining in your network. Today we will discuss the potential weak link in Malware Protection.

Does Cyber Insurance Justify Risky Behavior?
Far too often we hear people say “I don’t need to worry about security tools and training, I have Cyber Insurance”. While this doesn’t apply to everyone, we did want to take the time this week to talk about why Cyber Insurance isn’t enough to give your district the protection it needs and deserves.

Teamwork is the Best Defense Against Cyber Crime
Whether you are a sports enthusiast, a volunteer, or part of a work team, you have experienced first-hand the importance of good teamwork. We have all experienced what happens when a team works together, and when a team does not.
Tech Tidbit… Cybersecurity is everyone’s responsibility
Cyber Security has grown into an issue that needs to be addressed by everyone in a school district, not just by the Director of IT. To that end, we are starting a weekly bulletin series aimed at helping School Business Officials, who generally own the district’s risk management responsibility, become more knowledgeable about the […]