Living Through A Security Event – Recording Available

“Living Through a Security Event” is a practical, experience‑driven presentation that walks organizations—especially K‑12 districts—through the realities of preparing for, responding to, and defending against cybersecurity incidents. It emphasizes legal considerations, communication strategy, cyber‑insurance obligations, and modern attack behaviors.

Read more

April 2025 Tech Talk – Recording Available

The April Tech Talk 2025, presented by Scott Quimby (CISSP), Senior Technical Advisor at Acture/CSI, delivers a comprehensive update on today’s rapidly evolving cybersecurity threat landscape and the operational, technical, and strategic responses organizations—especially schools—must adopt to stay secure.

Read more

Tech Talk October 2025 Cybersecurity Update – Recording available

The Acture October 2025 Cybersecurity Update provides a comprehensive briefing on the rapidly intensifying cybersecurity threat landscape and the real‑world attacks that impacted organizations over the past year. The presentation outlines how AI‑driven threats, adversary‑in‑the‑middle techniques, malicious browser extensions, and stolen MFA session tokens have made traditional defenses insufficient.

Read more

Tech Tidbit – F(Ph)ishing Trips

I am back from my 29th trip to Acadia National Park on the coast of Maine.   There is something about sitting on a rock and staring out at the Ocean that is magical and refreshing. This year, though, we couldn’t do our annual fishing trip on Frenchman’s Bay.

Read more

Tech Tidbit – Beware of SEO Poisoning

I read an article today in which a judge declared that Google monopolized search. Well, that is a big duh! How long did it take the government to figure that out? Today, I will not debate the merits of Google’s status. I have a far more serious security concern to discuss.

Read more

Weekly Tech Tidbit – Implementing DNS Security

Most of can easily agree that our IT universe has been dominated over the past several months by cybersecurity discussions as we daily (sometimes it feels like hourly) see reports of the next cybersecurity event that has occurred in our nation, state, or sometimes with our peers.

Read more