“Living Through a Security Event” is a practical, experience‑driven presentation that walks organizations—especially K‑12 districts—through the realities of preparing for, responding to, and defending against cybersecurity incidents. It emphasizes legal considerations, communication strategy, cyber‑insurance obligations, and modern attack behaviors.
Living Through A Security Event – Recording Available
Tech Tidbit – Be careful about the words you say in a security event
I have had to work through a number of these business email compromise (BEC) attack situations that were potentially reportable events. It is important to understand that specific terms are legally charged words. “Breach” is probably the most significant.
Tech Tidbit – While you were sleeping
It is Tuesday at 12:29 a.m., at the end of Labor Day weekend. I am driving back from Westchester County Airport, having just flown in from Charlotte, NC. A message comes through. It is our friends at the Blackpoint Cyber SOC. One of our client’s legitimate users detected initiated a first-time VPN connection to M365 […]
Tech Tidbit – Hacker’s Bag of Magic Tricks – Clean IPs
“Reality is merely an illusion, albeit a very persistent one.” -Albert Einstein “You live in a world of illusion Where everything’s peaches and cream. We all face a scarlet conclusion, But we spend our time in a dream.” -Jungle Love, Steve Miller Band Ignorance is not bliss when it comes to network security.
Tech Tidbit – Who Do You Trust?
“Trust but verify.” -President Ronald Reagan, December 8th, 1987, at the Intermediate-Range Nuclear Forces (INF) Treaty Signing I watched a presentation the other day by the head of Threat Operations for a major Security Operations Center (SOC) that provides 24/7 security oversight over networks like yours.
Business Email Compromise – Be Very Afraid
Business Email Compromise (BEC) has become a security buzzword. It simply means using email to attack and gain access to your network. *Phishing* or *Spearphishing* are other terms you will hear. It has been estimated that 70% of the attacks against most sites come from email.
Welcome Back! We Have Work To Do
Welcome back! It was a very busy summer for all of us. Summer and the start of the school year felt much more “normal” to us. Putting my parent hat on, my youngest’s third-grade teacher approached me and told me she wished she had a classroom full of my daughter.
Protect Your District from Business Email Compromise
Please join us *tomorrow – Wednesday, October 12th* for an upcoming webinar focusing on Business Email Compromise. Jason Whitehurst, a cybersecurity professional, will be speaking about the significant increase in business email compromises for school systems.
