Featured Articles

April 15, 2019

The Sky is Falling: The Cassandra Curse

It’s easy to ignore warnings about threats not right in front of you. But that decision could devastate everything your district works toward.

READ
December 27, 2018

Don’t Click the Weakest Link

Phishing neutralizes even the strongest cyber security protections. Find out how it works and how you can stop it.

READ
December 27, 2018

Misplaced Trust

Beware the wolves in your midst. Internal fraud can be just as costly and frequent as external, but chances are you aren’t ready for it.

READ
October 19, 2018

The Crossing of Policy and Medicine

With the opioid epidemic raging, the life-saving drug Narcan has become a key issue for many districts.

READ
October 19, 2018

Don’t Get Burned by Public Wi-Fi

Wi-Fi has changed all of our lives, but before you login, make sure it’s safe to do so.

READ
July 10, 2018

The Devastating Effects of Stress

While stress can come as the result of a sudden trauma or incident, such as an accident, loss of a job, loss of a loved one, or bad diagnosis, it can also come from the routine responsibilities we all face. That’s key: everyone faces stress.

READ
October 16, 2017

Quit-Proof Your Team

Find yourself staying late because you’re down a person and work is piling up? Is your district constantly having to hire and rehire positions because people keep leaving? You’re not alone. Fortunately, there are things you can do to put a stop to it.

READ
October 16, 2017

It Came From Your Email

This data breach isn’t the only major cyber crime to severely impact millions of lives this year. In late June, multiple companies across the world were under siege by a virus that effectively shut down computers and extorted money.

READ
July 17, 2017

Handling New Hires with Kid Gloves

While it is not uncommon to employ minor employees at special districts, many employers don’t know that certain hazardous job functions performed by minors are strictly prohibited under federal and state laws.

READ
April 11, 2017

War Games

Many large-scale cyber threats demonstrate the deceptively simple techniques hackers often employ to infiltrate our computers and steal our information: requests from a stranger on your social media, the stray USB drive on the floor, and the email you failed to scrutinize before opening.

READ