AI is changing the entire cyber threat landscape, even in your classrooms. That’s why this year’s Cybersecurity Event is all about how AI impacts school data privacy and what districts can do to stay ahead. For our 10th anniversary, we’re bringing together thought leaders and district innovators for a full day of strategies, stories, and solutions you […]
AI is changing the entire cyber threat landscape, even in your classrooms. That’s why this year’s Cybersecurity Event is all about how AI impacts school data privacy and what districts can do to stay ahead. For our 10th anniversary, we’re bringing together thought leaders and district innovators for a full day of strategies, stories, and solutions you […]
AI is changing the entire cyber threat landscape, even in your classrooms. That’s why this year’s Cybersecurity Event is all about how AI impacts school data privacy and what districts can do to stay ahead. For our 10th anniversary, we’re bringing together thought leaders and district innovators for a full day of strategies, stories, and solutions you […]
AI is changing the entire cyber threat landscape, even in your classrooms. That’s why this year’s Cybersecurity Event is all about how AI impacts school data privacy and what districts can do to stay ahead. For our 10th anniversary, we’re bringing together thought leaders and district innovators for a full day of strategies, stories, and solutions you […]
Last summer a number of our M365 clients were hit with a “Direct Send” attack. This attack bypassed high-powered spam filters like Barracuda Email Protection and sent emails directly into M365 without any authentication! The threat actor email actually came from a real person at the client! The email had a malicious attachment.
There is a new, growing attack surface that is becoming increasingly dangerous to your network operations—the cloud, specifically your Google Apps or Microsoft 365 cloud instances. I have read commentary that M365 is believed to have the greater attack surface.
We all understand the scourge of Ransomware. It is debilitating. Even in the best case, it consumes a huge amount of time to recover. However, now the bad guys are getting even more nasty. They want their money. If you decide you can recover or don’t care, they get nothing.
“Legends state that Achilles was invulnerable in all of his body except for one heel because when his mother Thetis dipped him in the River Styx as an infant, she held him by one of his heels. Alluding to these legends, the term “Achilles’ heel” has come to mean a point of weakness, especially in […]
Last time I talked about making email safer. I focused on inbound email to your users and outbound encrypted emails. However, I neglected to say that advanced spam filters also work outbound. That means that your end-users email and attachments will be scanned to protect against an inadvertent sending out of malicious content.
Last week I talked about the importance of Cloud Backup in our new remote teaching and learning and back-office school environments. This week I am going to talk about secure and reliable communications. The reality is that the number one threat to your network is your users clicking on attachments or web links that lead […]