Posts Tagged ‘cyber’
The Groove and Rhythm of Cybersecurity
Finding the Groove in Cybersecurity Using Data Management, Policies, and Configurations to Create Security Baselines. Have you ever listened to a song that really grooved? How about a song that you couldn’t help but dance to? Recently I was listening to Mutemath’s self-titled album from 2006, which is an absolute banger, and found myself unconsciously…
Read MoreHow to Create and Implement a Data Recovery Plan
A Hard Lesson in Backups I was 13 years old when I learned why it was important to have good backups. It was 2008 and the new World of Warcraft expansion, Wrath of the Lich King, had just launched and the rest of my friends were already waiting in the game for me. I was…
Read MoreHarnessing AI and Machine Learning for Enhanced Malware Defenses
Malware: Understanding the Threat Now, flash forward 20 some years and the word malware gets thrown around so much these days that it is used to describe so many different computer ailments and has become almost a unanimous term for any computer or internet-related issue that someone might experience. On top of this generalization, cybersecurity…
Read MoreThe Age of the Browser: How to Secure the Browser and Minimize Your District’s Attack Surface
From Computer Labs to Chromebooks When I was in elementary school, we had one computer lab in our library that was filled with old Macintosh computers that were 1 and a half feet by 1 and a half feet cubes that weighed 50 pounds each. Each one had Microsoft Word installed on the machine with…
Read MoreCreating and Maintaining an Audit Log Management Process
If your district does not yet have an Audit Log Management Policy in place, there is no better time than now to get one drafted up. As always, if you are a Forward Edge Cybersecurity Solution customer and need help getting started in the policy creation process or need to review your current policy, our team of certified security professionals is available to assist you in that process.
Read MoreUnderstanding the Principle of Least Privilege
The Jurassic Park Lesson The Principle of Least Privilege is the principle that users and programs should only have the necessary privileges to complete their tasks. In the case of Jurassic Park, this whole situation could have been avoided if they had applied the principle of least privilege throughout the systems in the park. Sure, Dennis…
Read More