Blog
The Rise of AI Scams: What You Need to Know to Stay Safe
AI is making scams smarter, faster, and harder to spot. Criminals now use artificial intelligence to create ultra-realistic phishing emails, fake voices, and...
Using AI for Note-Taking
AI Note-Takers are a great time saver and gaining popularity. The ease of use and ability to produce an agenda and after-action items...
Vishing 3.0
Cybersecurity threat trends continue to evolve, but seemingly outmoded threats vectors don’t always go away; sometimes, like in the case of vishing, they...
Tax Season AI-Powered Scams Are Targeting You—Here’s How to Stay Safe
As tax season ramps up in 2025, cybercriminals are leveraging cutting-edge technology to launch their most convincing and costly...
“Wi" Should I Log?
Guest wireless is a convenience to offer visitors. What information should be logged for these connections?
If someone used the...
Guide for Developing an Internal Vetting Process
Our data privacy team has created a handy guide to help your district develop a process for ensuring every resource with access to...
Cheap (Cybersecurity) Wisdom
Russell Eubanks in a SANS Institute video “Improve Your Cyber Security Culture” offers the following advice learned from one of his own mentors:...
The Reality of IoT Security : Guests on Your Network
IoT devices and other vendor appliances, while convenient, are often security weak points. They frequently ship with outdated firmware, weak passwords, and even...
Don’t Just “Google it”
“Google” is now a term embedded in our language and s iroutinely used. As with all routines, we may become complacent on how we...
Defining "Reasonable Cybersecurity"
State laws, legal cases, grant requirements, cyber insurance, and those impacted by data exposure all may refer to the term “reasonable cybersecurity” when...
A Stitch in Time: Why Patching Should Be on Your Schedule.
In the ever-evolving landscape of cybersecurity, vigilance is paramount. While firewalls and intrusion detection systems form a strong first line of defense, they...
Beware of the 'ishing'
Social Engineering is the use of deception in order to manipulate the victim into performing an action for fraudulent purposes. The bad actor...
CIS Critical Controls Version 8.1
The Center for Internet Security (CIS) has long been respected for it's framework of critical security controls. Released in 2008, it's purpose was...
Data Privacy Day - January 28, 2025: You Have the Power to Take Charge of Your Data
As more data is stored in the cloud or transferred to third parties, how can...
Incident Reporting: Your First Line of Defense
Organizations use layered security to prevent falling victim to a cybersecurity incident. The 3 main elements of layered security require administrative, physical and...
Ring in the New Year with a Cybersecurity Makeover
A new year brings new opportunities. What a great time to review your cybersecurity practices! Evaluate every aspect of your digital life. Check...
Caught in the Web: Common Cyber Crimes
Cyber crime is a broad term that can encompass a wide variety of malicious activity. These attacks can be aimed at networks, businesses...
Salt Typhoon Cyber Attack
The Salt Typhoon cyber attack, conducted by bad actors in China, targeted telecommunication organizations. Major telecom companies were hacked, including AT&T, Verizon, T-Mobile...
'Tis the Season for Holiday Scams
Scammers are especially active during the holiday season. The crooks are taking advantage of the consumer's good cheer, generous nature, and hunt for...