There is a new, growing attack surface that is becoming increasingly dangerous to your network operations—the cloud, specifically your Google Apps or Microsoft 365 cloud instances. I have read commentary that M365 is believed to have the greater attack surface.
Tech Tidbit – How to protect the cloud on a budget…
Tech Tidbit – Do you understand DoH? Steps you need to take now to prevent chaos with your web filtering
We have a new technology coming online with all the popular web browsers. It is called DNS over HTTPS or DoH. The concept is instead of using your internal DNS to resolve web pages, the web browser goes back to an external DNS site to resolve the page.
Tech Tidbit – Online Credential Theft
I was watching a panelist discussion post-mortem discussing firsthand knowledge of 25 major ransomware-style breaches. One of the panelists was an award-winning, ex-NSA offensive hacker. One item that was stressed as a common theme across many breaches was credential theft being the number one way bad people get into the network.
Protect Your District from Business Email Compromise
Please join us *tomorrow – Wednesday, October 12th* for an upcoming webinar focusing on Business Email Compromise. Jason Whitehurst, a cybersecurity professional, will be speaking about the significant increase in business email compromises for school systems.
Weekly Tech Tidbit – I challenge you to prove your backups work
“None shall pass” -The Black Knight “Monty Python and the Holy Grail” Today I would like to challenge you to “test two aspects of your network backups. Most of you have never done this because yPreview (opens in a new tab)ou are “too busy putting out fires”. It is summer.
Weekly Tech Tidbit – Paper’s Please
The first line of email defense is a properly formed SPF record “Paper’s Please” Those words denote fear. Some official, authority person (often with a gun and with lots of their co-workers with guns) is asking for identification at a checkpoint.
Tech Tidbit – My Achilles Heel – Closing your District’s Vulnerability Gaps
“Legends state that Achilles was invulnerable in all of his body except for one heel because when his mother Thetis dipped him in the River Styx as an infant, she held him by one of his heels. Alluding to these legends, the term “Achilles’ heel” has come to mean a point of weakness, especially in […]
CSI’s Cybersecurity Event Session – Cisco Umbrella and Duo – Recording Available
Please join us for CSI’s Cybersecurity Event, Session Three! We will continue to build the list of actions you can take to better protect your district from the current threat landscape. Speaker: Justin Pennock, Cisco Cybersecurity Sales Specialist Session Description: Go on the offensive and join us for a demo on Cisco Umbrella […]
CSI’s Cybersecurity Event Session Two- The Front Lines of Ransomware – Recording Available
Cybersecurity Event Session Two: The Front Lines of Ransomware Speaker: Chris Loehr, Co-Founder, Service Provider Partners Chris Loehr is a cybersecurity professional and has worked firsthand on the resolution of roughly 300 ransomware incidents this past year.
Weekly Tech Tidbit – Risk and Compliance Part III – Making your email more reliable
Last time I talked about making email safer. I focused on inbound email to your users and outbound encrypted emails. However, I neglected to say that advanced spam filters also work outbound. That means that your end-users email and attachments will be scanned to protect against an inadvertent sending out of malicious content.