We live in interesting times and continue to face some very unique challenges to keep your school district safe and stable so teachers can teach, students can learn and the staff behind the scenes can do all the important tasks that make the district function well.
Business Email Compromise (BEC) has become a security buzzword. It simply means using email to attack and gain access to your network. *Phishing* or *Spearphishing* are other terms you will hear. It has been estimated that 70% of the attacks against most sites come from email.
Welcome back! It was a very busy summer for all of us. Summer and the start of the school year felt much more “normal” to us. Putting my parent hat on, my youngest’s third-grade teacher approached me and told me she wished she had a classroom full of my daughter.
This week I would like to talk to you about Malware Defenses. This topic is in the NIST Detect and Protect categories. Antivirus has been around for what seems like forever. However, as long as antivirus has existed, we have had the problem with getting it on “all” servers and “all” endpoints.
As mentioned in last week’s Tech Tidbit, we have begun a new series of weekly bulletins sent to School Business Officials giving them more information on the changing Cybersecurity landscape and how the NIST Cybersecurity Framework can help them increase their security while complying with the Ed Law 2-d guidelines.
This week I’d like to talk a little bit about the NIST Category – Recover. According to NIST, the Recover Category “identifies appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident.
In last week’s email, we talked about the third NIST Cybersecurity Framework category – Detect. This week we will be discussing the fourth category – Respond. As with Protect, the general idea of Respond seems pretty clear-cut.
In last week’s email, we talked about the second NIST Cybersecurity Framework category – Protect. This week we will be discussing the third category – Detect. Detection seems like it should be pretty straightforward.
In last week’s email, we talked about the first NIST Cybersecurity Framework category – Identify. This week we will be discussing the second category – Protect. The idea of protecting yourself and your network is pretty straightforward general concept.
In last week’s email, we talked about what the NIST Cybersecurity Framework was, how it would help your district manage its Cyber Risk, and its alignment with Ed Law 2-d. Just as a reminder, there are five high-level categories that help organize the NIST CSF: IDENTIFY PROTECT DETECT RESPOND RECOVER Today we will […]