Have you ever been part of a group where a leader has not been clearly identified? It takes twice as long to get anything done and arguing and conflict are the order of the day. Cybersecurity in your district works the same way.
In October 1993 I was sitting in a van in dusty Nmanga, Kenya. Nmanga was the only legal border crossing between Kenya and Tanzania. It is next to Amboseli National Park and just to the West of Mount Kilimanjaro. My guide instructed our group to wait in the van with the windows up and the […]
Everyone knows the adage “No one is perfect”. Unfortunately for anyone with a computer network, the bad actors who want to infiltrate your system are ready to take full advantage of any mistake they can find. Cyber security is a constant competition between software/code developers and bad actors.
Last week we talked about how one weak link can open the door to a Cyber Incident. We discussed the weak link of old, unused user IDs remaining in your network. Today we will discuss the potential weak link in Malware Protection.
There is a new critical security issue that affects web browsers as well as other software that use something called libwebp. This feels a whole lot like the LOG4J vulnerability because libwebp is not an application you can see, but rather an embedded module in other applications.
We have all heard the phrase “A chain is only as strong as its weakest link”. When it comes to Cyber Security that phrase is all too true. Sometimes a Cyber Attack comes in via something that appears small (like a user clicking on an email link). Sometimes that small thing is an unused userid that […]
I learned to drive “on the wrong side of the road” on a Monday morning in downtown London. I hit my first object in about 50 feet when I ran over the cross beam of a crowd fence and it bounced up and tapped my car. It was scary, but I eventually got to the […]
Late in the afternoon on a Friday, I created a bit of a scare for those of you who are part of our Paladin Sentinel monitoring system. I was doing my due diligence removing a monitoring policy we experimented with after our last major system upgrade, but didn’t provide any value to us or you.
We have recently been approached by many school districts to talk to their district office staff and in some instances their faculty about phishing and security as it relates to money and personally identifiable information (PII). These have been in the form of either special in-service training for district office/business office staff or as part […]
Tech Tidbit – Do you understand DoH? Steps you need to take now to prevent chaos with your web filtering
We have a new technology coming online with all the popular web browsers. It is called DNS over HTTPS or DoH. The concept is instead of using your internal DNS to resolve web pages, the web browser goes back to an external DNS site to resolve the page.