I read an article today in which a judge declared that Google monopolized search. Well, that is a big duh! How long did it take the government to figure that out? Today, I will not debate the merits of Google’s status. I have a far more serious security concern to discuss.
We are excited to partner with NYSCATE to bring you this important upcoming webinar! New York State K-12 school districts must comply with EdLaw 2-d, which is challenging due to limited staff and resources.
Great News!! The Federal Communications Commission (FCC) has announced the opening of the Cybersecurity Pilot Program application window for K-12 schools and libraries.
Exploring the Benefits of Digitalization Digital transformation is no longer an option. It’s a necessity for school districts aiming to thrive in the modern landscape. Yet many districts find themselves grappling with the complexities of digital transformation.
I stare at the Paladin Sentinel Monitoring Console every morning and see what happened with our monitored servers and networks overnight. I see many patterns and similar events happening between your networks. Here is one of my pet peeves of what I often see with a free suggestion to help keep me calm in my […]
A few years ago, there was a very public cyber insurance denial case. As I understand it, the business contracted with Travelers for cyber insurance. They filled out their questionnaire and stated that they had multi-factor authentication (MFA) everywhere.
It is Tuesday at 12:29 a.m., at the end of Labor Day weekend. I am driving back from Westchester County Airport, having just flown in from Charlotte, NC. A message comes through. It is our friends at the Blackpoint Cyber SOC. One of our client’s legitimate users detected initiated a first-time VPN connection to M365 […]
“Reality is merely an illusion, albeit a very persistent one.” -Albert Einstein “You live in a world of illusion Where everything’s peaches and cream. We all face a scarlet conclusion, But we spend our time in a dream.” -Jungle Love, Steve Miller Band Ignorance is not bliss when it comes to network security.
Today’s cyber landscape feels a lot like this picture. Anyone who uses a device connected to the internet is under threat. You never know when that arrow with your name will find you. Do you have the armor you need to give you the best chance of survival when the arrow finds you? Medieval warriors […]
You arrive at work tomorrow and are greeted by the news that a cyber-attack has compromised your district’s network, and the network is unavailable. What is the first thing you do? What is the second? When confronted by such alarming news, most people would be overwhelmed and unsure of the next steps.