View Post

Does My School Need an “Incident Response” Plan?

In Cybersecurity, Education by Ken Nero

An incident response plan is an organized approach to addressing the aftermath of a security breach or cyber-attack. Certain industries, like educational, medical, and financial institutions absolutely should have one. But even if you don’t have a lot of sensitive information, it’s best to have SOME idea of what you would do if a cyber-attack locked all your files or …

View Post

Frequently Asked Questions About the Dark Web

In Cybersecurity by Ken Nero

WHAT IS THE DARK WEB? The dark web is a hidden universe contained within the “deep web”— a sub-layer of the internet that is hidden from conventional search engines. The surface web today makes up only 4% of the internet. It stores only 19TB of data. Imagine how tiny it is in comparison to the dark web, which has an …

View Post

What Makes A Strong Password? And Why Do I Need One?

In Cybersecurity by Ken Nero

Think about some of your private accounts right now. Chances are that you have an email account, social media accounts, bank account and more that are all password protected. Do you share passwords across different accounts, and are your passwords strong enough to keep cybercriminals away from your private information? If not, it might be time to evaluate. Passwords offer …

View Post

The K-12 Cyber Incident Map

In Cybersecurity, Education by Ken Nero

Every year, Ed Tech Strategies, a Virginia-based research and counsel consultancy, published a K–12 Cyber Incident Map– an interactive visualization of cybersecurity-related incidents affecting K–12 public schools and districts in the United States. Since January 1, 2016, U.S. K-12 public schools and districts were reported to have experienced at least 1,331 cyber security-related incidents resulting in the disclosure of personal information, the loss …

View Post

Take the October Cybersecurity Challenge & Win $100!

In Cybersecurity, Trivia by Ken Nero

Who says cybersecurity can’t be fun?! Test your knowledge with a fun mix of cybersecurity and fall harvest trivia. Check the leaderboard to see how your knowledge stacks up. The contest ends on October 31st. Winners will be announced early November. You can play online at: https://www.ikonbusinessgroup.com/october-trivia/

View Post

4 Employee Personality Traits that Could Threaten Your Cybersecurity!

In Cybersecurity, Education by Ken Nero

To celebrate Cybersecurity Awareness Month, we’ve compiled a list of four employee cyber personalities to help you identify potential areas of improvement for your company’s cybersecurity strategies. Cybersecurity is a serious topic, but we can still have fun while learning about it. Cybersecurity threats come in many forms, and there are no easy fixes to make your school completely safe …

View Post

Back To School! The 4 Cyber Security Trainings You Must Do With ALL Employees

In Cybersecurity, Education by Ken Nero

It’s back-to-school season! Soon, our kids will return to the classroom, where they will relearn the information from the prior school year to ensure that they were able to retain that knowledge. There’s nothing wrong with needing a refresher, and this is true for both students and your employees. If your staff has not had a refresher course on your …

View Post

Tips for Implementing Effective Cybersecurity Awareness Training

In Cybersecurity by Ken Nero

Until recently, most organizations would impart security awareness training as lectures using a slide deck. They typically conducted these training sessions once a year or once during induction. However, these sessions proved ineffective because of their uninteresting nature and lack of follow-up sessions.  If you intend to develop a security-focused culture, implementing robust security awareness training is crucial. Here are …

View Post

Be Cautious of These 3 Cybersecurity Threats

In Cybersecurity by Ken Nero

If you’re responsible for your school’s technology infrastructure, you’re probably aware of some of the different methods that cybercriminals will use to try to steal sensitive information. But there are some new threats making headlines. A recent report from CyberCatch saw the cybersecurity platform provider review 20,000 randomly selected organizations in the U.S. for vulnerabilities that can be exploited by …