Blog
Creating a Contact List for Cyber Incident Reporting and Assistance
Cyber criminals continue to organize themselves-- from building scam center office complexes to creating ransomware payment help desks. The more organized, sophisticated and...
Data Privacy Agreements: How to Vet a Resource
Several districts have asked for more detail about how to vet a resource prior to entering a request in the Resource Registry. Below...
Data Mapping and Inventory: What they are, How important are they, and How to do them.
Effectively managing your data is critical for compliance, risk reduction, and informed decision-making. Data mapping and inventory are foundational practices for any organization...
Cybersecurity and Accessibility
People with disabilities face an increased risk of being a victim of cybercrime due to the lack of tool...
Next-Gen Phishing Training
New AI-tuned phishing attempts are cause for re-evaluation of user phishing training. With AI chatbots able to assist in the generation of email...
A Thank You to Teachers — and a Tech-Savvy Self-Care Gift
You spend so much time curating experiences for others. This summer, let technology curate something just for you — whether it’s a relaxing book list, a fresh summer recipe lineup, inspiring podcasts, or outdoor adventures you’ve been craving.
The Rise of AI Scams: What You Need to Know to Stay Safe
AI is making scams smarter, faster, and harder to spot. Criminals now use artificial intelligence to create ultra-realistic phishing emails, fake voices, and...
Unleash Limitless Learning: Upload Your Own Content to Read Along in Google Classroom!
Exciting news for educators! Google Workspace Updates has announced a fantastic new feature for Read Along that will revolutionize your literacy instruction. Now,...
Using AI for Note-Taking
AI Note-Takers are a great time saver and gaining popularity. The ease of use and ability to produce an agenda and after-action items...
Vishing 3.0
Cybersecurity threat trends continue to evolve, but seemingly outmoded threats vectors don’t always go away; sometimes, like in the case of vishing, they...
Tax Season AI-Powered Scams Are Targeting You—Here’s How to Stay Safe
As tax season ramps up in 2025, cybercriminals are leveraging cutting-edge technology to launch their most convincing and costly...
“Wi" Should I Log?
Guest wireless is a convenience to offer visitors. What information should be logged for these connections?
If someone used the...
Guide for Developing an Internal Vetting Process
Our data privacy team has created a handy guide to help your district develop a process for ensuring every resource with access to...
Google Workspace Updates
In a recent update posted on March 14, 2025, the Google Workspace team announced a new requirement for Google Workspace for Education administrators...
Cheap (Cybersecurity) Wisdom
Russell Eubanks in a SANS Institute video “Improve Your Cyber Security Culture” offers the following advice learned from one of his own mentors:...