Resources

Teamwork is the Best Defense Against Cyber Crime

Whether you are a sports enthusiast, a volunteer, or part of a work team, you have experienced first-hand the importance of good teamwork. We have all experienced what happens when a team works together, and when a team does not.

Read more

Business Email Compromise – Be Very Afraid

Business Email Compromise (BEC) has become a security buzzword. It simply means using email to attack and gain access to your network. *Phishing* or *Spearphishing* are other terms you will hear. It has been estimated that 70% of the attacks against most sites come from email.

Read more

Welcome Back! We Have Work To Do

Welcome back! It was a very busy summer for all of us. Summer and the start of the school year felt much more “normal” to us. Putting my parent hat on, my youngest’s third-grade teacher approached me and told me she wished she had a classroom full of my daughter.

Read more

NIST Cybersecurity Framework – Malware Defenses

  This week I would like to talk to you about Malware Defenses. This topic is in the NIST Detect and Protect categories. Antivirus has been around for what seems like forever. However, as long as antivirus has existed, we have had the problem with getting it on “all” servers and “all” endpoints.

Read more

NIST Cybersecurity Framework – Software Inventory

  As mentioned in last week’s Tech Tidbit, we have begun a new series of weekly bulletins sent to School Business Officials giving them more information on the changing Cybersecurity landscape and how the NIST Cybersecurity Framework can help them increase their security while complying with the Ed Law 2-d guidelines.

Read more

NIST Cybersecurity Framework – Recover

  This week I’d like to talk a little bit about the NIST Category – Recover. According to NIST, the Recover Category “identifies appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident.

Read more

NIST Cybersecurity Framework – Respond

In last week’s email, we talked about the third NIST Cybersecurity Framework category – Detect. This week we will be discussing the fourth category – Respond. As with Protect, the general idea of Respond seems pretty clear-cut.

Read more

NIST Cybersecurity Framework – Detect

In last week’s email, we talked about the second NIST Cybersecurity Framework category – Protect. This week we will be discussing the third category – Detect. Detection seems like it should be pretty straightforward.

Read more

NIST Cybersecurity Framework – Protect

In last week’s email, we talked about the first NIST Cybersecurity Framework category – Identify. This week we will be discussing the second category – Protect. The idea of protecting yourself and your network is pretty straightforward general concept.

Read more

NIST Cybersecurity Framework – Identify

    In last week’s email, we talked about what the NIST Cybersecurity Framework was, how it would help your district manage its Cyber Risk, and its alignment with Ed Law 2-d. Just as a reminder, there are five high-level categories that help organize the NIST CSF: IDENTIFY PROTECT DETECT RESPOND RECOVER Today we will […]

Read more