Employee education small banner

Creating a Contact List for Cyber Incident Reporting and Assistance

Cyber criminals continue to organize themselves-- from building scam center office complexes to creating ransomware payment help desks. The more organized, sophisticated and...

Data Privacy Agreements: How to Vet a Resource

Several districts have asked for more detail about how to vet a resource prior to entering a request in the Resource Registry. Below...

Data privacy banner

Data Mapping and Inventory: What they are, How important are they, and How to do them.

Effectively managing your data is critical for compliance, risk reduction, and informed decision-making. Data mapping and inventory are foundational practices for any organization...

Cybersecurity and Accessibility

People with disabilities face an increased risk of being a victim of cybercrime due to the lack of tool...

Next-Gen Phishing Training

New AI-tuned phishing attempts are cause for re-evaluation of user phishing training. With AI chatbots able to assist in the generation of email...

A Thank You to Teachers — and a Tech-Savvy Self-Care Gift

You spend so much time curating experiences for others. This summer, let technology curate something just for you — whether it’s a relaxing book list, a fresh summer recipe lineup, inspiring podcasts, or outdoor adventures you’ve been craving.

Cyber Security blog banner

The Rise of AI Scams: What You Need to Know to Stay Safe

AI is making scams smarter, faster, and harder to spot. Criminals now use artificial intelligence to create ultra-realistic phishing emails, fake voices, and...

Unleash Limitless Learning: Upload Your Own Content to Read Along in Google Classroom!

Exciting news for educators! Google Workspace Updates has announced a fantastic new feature for Read Along that will revolutionize your literacy instruction. Now,...

Using AI for Note-Taking

AI Note-Takers are a great time saver and gaining popularity.  The ease of use and ability to produce an agenda and after-action items...

Help Desk person

Vishing 3.0

Cybersecurity threat trends continue to evolve, but seemingly outmoded threats vectors don’t always go away; sometimes, like in the case of vishing, they...

Tax Season AI-Powered Scams Are Targeting You—Here’s How to Stay Safe

As tax season ramps up in 2025, cybercriminals are leveraging cutting-edge technology to launch their most convincing and costly...

“Wi" Should I Log?

Guest wireless is a convenience to offer visitors.  What information should be logged for these connections? 

If someone used the...

Guide for Developing an Internal Vetting Process

Our data privacy team has created a handy guide to help your district develop a process for ensuring every resource with access to...

Google Workspace Updates

In a recent update posted on March 14, 2025, the Google Workspace team announced a new requirement for Google Workspace for Education administrators...

Ransomware graphic

Cheap (Cybersecurity) Wisdom

Russell Eubanks in a SANS Institute video “Improve Your Cyber Security Culture” offers the following advice learned from one of his own mentors:...