Today we continue our look at a series of practical steps that districts can use to increase their NIST compliance. Looking at the complete set of NIST controls can be a daunting experience. One of the best ways we have found to make these cybersecurity improvements more attainable is following the CIS Controls Top […]
Your Weekly Tech Tidbit… Taking a look at NIST controls
Your Weekly Tech Tidbit…Walking the road toward NIST compliance…Controlled Use of Administrative Privileges
Controlled Use of Administrative Privileges / DETECT / PROTECT..Change Default Passwords..Ensure the Use of Dedicated Administrative Accounts There is a lot here to unpack. If you haven’t done so already, you should try very hard to break your reliance on the default “Administrator” account.
Your Weekly Tech Tidbit…NIST Software Inventory
As we continue our NIST series, I am going to take a moment and discuss inventory and control of software assets in the IDENTIFY / RESPOND category There are a number of practical ways to better control our software inventory.
Your Weekly Tech Tidbit – Improving Your Security With Huntress Labs
Weekly Tech Tidbit – Guarding The Wall “Son, we live in a world that has walls, and those walls have to be guarded by men with guns” -Col. Jessep “A Few Good Men” That classic movie line rings true on all our networks.
Your Weekly Tech Tidbit – Clean Up, Clean Up. Your Security Depends On It
“Clean up, clean up, everybody, everywhere, Clean up, clean up everybody do their share” -Barney That song has been stuck in my head recently having two Kindergarten aged kids in the house. However, after many of the conversations I have had with you over the last few weeks, it seems an appropriate message this […]
Weekly Tech Tidbit – When it absolutely, positively has to be there overnight
“When it absolutely, positively has to be there overnight” – FedEx As many of you know, Bob and I have been doing this for a while – 41 years in fact. And through all those years, every day is new and fun. Thanks for your support and friendship and trust through all those years.
Weekly Tech Tidbit – Risk and Compliance Part III – Making your email more reliable
Last time I talked about making email safer. I focused on inbound email to your users and outbound encrypted emails. However, I neglected to say that advanced spam filters also work outbound. That means that your end-users email and attachments will be scanned to protect against an inadvertent sending out of malicious content.
Weekly Tech Tidbit – Remote Risks and Compliance Part II – Secure and Reliable Communications
Last week I talked about the importance of Cloud Backup in our new remote teaching and learning and back-office school environments. This week I am going to talk about secure and reliable communications. The reality is that the number one threat to your network is your users clicking on attachments or web links that lead […]
Weekly Tech Tidbit – Secure Your Endpoints with Disk Encryption
Disk encryption is growing in popularity as a means of better-securing laptops and desktops. Microsoft is offering BitLocker natively in Windows 10. Microsoft Endpoint Configuration Manager has a built-in BitLocker Administration console. If you don’t have SCCM, then Microsoft offers the MBAM console to manage encryption.
Tech Tidbit – Closing Time. Protocols and Processes that have to go!
For the last few years Microsoft has been talking about “Modern” this or “Modern” that. In the quest for improved security they are agressively trying to move everyone to more modern protocols. The impending LDAPS changes are an example of this. However, there are more processes and protocols that they are urging you to retire.