Cyber Risk Articles

October 23, 2019

Are You Ready For…Phishing and Social Engineering Attacks?

The advice listed here is taken from “Ready for Anything,” our guide to responding to disasters and calamities big and small. Find out how you can get your free copy today.

READ
July 25, 2019

Microsoft Ends Support for Windows 7; Office 2010 to Follow

End of support for some Microsoft products could leave your district vulnerable to cyber attacks.

READ
July 25, 2019

Ready for Anything: Responding to Cyber Attacks

In the latest entry, we discuss how to prevent, manage, and respond to cyber attacks on any scale.

READ
April 15, 2019

Prepping for a Data Breach

It isn’t enough to just fret over the possibility of a data breach, it’s time you did something to prepare.

READ
December 27, 2018

Don’t Click the Weakest Link

Phishing neutralizes even the strongest cyber security protections. Find out how it works and how you can stop it.

READ
October 19, 2018

Don’t Get Burned by Public Wi-Fi

Wi-Fi has changed all of our lives, but before you login, make sure it’s safe to do so.

READ
January 2, 2018

IT’S HERE…

We have been talking about cyber security for years, and up until now, it’s always seemed like a distant threat. Districts are being hacked and ransomed for their information now.

READ
October 16, 2017

It Came From Your Email

This data breach isn’t the only major cyber crime to severely impact millions of lives this year. In late June, multiple companies across the world were under siege by a virus that effectively shut down computers and extorted money.

READ
April 11, 2017

Reminder About Red Flags Rule

Do you collect funds from the public for any reason? This might include park space rental, any kind of service or training, utility bills, or medical billing. If so, then your district is a creditor and must comply with these regulations.

READ
April 11, 2017

War Games

Many large-scale cyber threats demonstrate the deceptively simple techniques hackers often employ to infiltrate our computers and steal our information: requests from a stranger on your social media, the stray USB drive on the floor, and the email you failed to scrutinize before opening.

READ