We have recently been approached by many school districts to talk to their district office staff and in some instances their faculty about phishing and security as it relates to money and personally identifiable information (PII). These have been in the form of either special in-service training for district office/business office staff or as part […]
If you subscribe to our Paladin Sentinel monitoring service, hopefully, you know that either myself or one of our technical staff actively sweeps through the monitoring consoles sometime between 6 am to 7 am with the goal of identifying any major issues such as site, building or device down before 7 am.
Occasionally the SentinelOne agents included in our CSEDR offering are operating but show a red “x” denoting that the agent is operational, but not visible to the main SentinelOne console. SentinelOne has updated their agents to better explain why they are not communicating.
We all understand the scourge of Ransomware. It is debilitating. Even in the best case, it consumes a huge amount of time to recover. However, now the bad guys are getting even more nasty. They want their money. If you decide you can recover or don’t care, they get nothing.
“You don’t have to run faster than the bear to get away. You just have to run faster than the guy next to you.” ― Jim Butcher Recently we had the former White House Chief Information Security Officer (CISO) on our webinar talking about the Ukrainian war and its impact on us.
I was watching a panelist discussion post-mortem discussing firsthand knowledge of 25 major ransomware-style breaches. One of the panelists was an award-winning, ex-NSA offensive hacker. One item that was stressed as a common theme across many breaches was credential theft being the number one way bad people get into the network.
Last weekend my youngest daughter started a new baton program on Saturday mornings. Sitting there I realized I have been taking at least one of my four daughters to baton for the last 22 years across two different teams in two different towns.
How do you intend to block lateral movement if an attacker has made it into your network? In looking at recent ransomware attacks there are some consistent attack vectors used for lateral movement that are almost always exploited.
Add the last “S” for security. I remember the old mattress commercials. You left the last “S” of the phone number for savings. In our world, we need to always make sure we have the last “S” for security. In our world, any internet-facing connection simply must use a commercial SSL (i.e. VPN, Secure […]
In today’s school environment, everyone and almost every piece of equipment talks to the internet and run on your network. Your HVAC system, security cameras, phones, bus cameras and communication, attendance, payroll, and many of your teaching tools are all connected to the internet.