View Post

How to Make Cybersecurity Awareness Second Nature for Your K-12 School

In Cybersecurity by Ken Nero

In order to be effective, your school’s cybersecurity program has to start from the top-down and include all employees. It’s no longer enough to depend entirely on your IT department to jump in to the rescue whenever there’s a breach. It’s imperative to have strong security policies in place that are well-thought-out and clearly documented and clearly and simply explained …

View Post

Compliance And Cybersecurity – Why Both Are Important

In Cybersecurity, Education by Ken Nero

In the world of K-12 education, you’ll inevitably hear about the many ways to beef up your cybersecurity to ensure the safety of your staff and student data. However, another term is often heard when discussing cybersecurity: compliance. It’s not talked about as often, but both cybersecurity and compliance are essential for any school. Compliance helps keep your critical data …

View Post

3 Cybersecurity Tips That’ll Save Your Bacon!

In Cybersecurity by Ken Nero

Be Careful Using Public WiFiWe’re all guilty of it: connecting to free public WiFi. Whether it’s at the coffee shop, hotel or airport, the temptation to check e-mail and surf the web is just too strong to resist. So BEFORE you connect to any free, public WiFi, make sure the connection is legitimate. It’s not uncommon for hackers to set …

View Post

Keep Your School Compliant by Following These Technology Tips

In Cybersecurity, Education by Ken Nero

A failure to remain compliant can spell doom. But what many Executive Directors and Operations Managers don’t realize is that compliance and security go hand in hand. Compliance is in place to prevent security breaches and give guidelines for what to do if a breach does occur. Your school won’t become compliant on its own. It takes plenty of time, …

View Post

Don’t Let Your School Become a Cybercrime Statistic

In Cybersecurity, Education by Ken Nero

There are some records that you don’t want to be a part of setting, like this year’s expected record number of new data breaches. Keep cybercriminals out of your school and your pockets when you make smart cybersecurity choices. Answering the following questions can help you determine just how vulnerable you are. Are you… Using multifactor authentication to keep hackers …

View Post

Ransomware by the Numbers

In Cybersecurity by Ken Nero

Ransomware continues to be Public Enemy Number One in terms of IT security concerns, representing more than 60% of all malware attacks. As the threat of Ransomware grows, organizations are under increased pressure to protect themselves and their critical data. At IKON, we take data protection seriously and want to ensure organizations like yours are armed with the facts. The following statistics …

View Post

Devices Hacked by Linux Malware

In Cybersecurity, Uncategorized by Ken Nero

Thousands of devices have been hacked by a Linux malware named Rakos, and while researchers have yet to see any actual malicious activity involving the botnet, they believe it could be used for powerful distributed denial-of-service (DDoS) attacks. Rakos, whose existence was brought to light in December 2016 by ESET, targets Linux systems by launching brute-force attacks via SSH. The …

View Post

iOS Security Broken with a Simple Wi-Fi Connection

In Cybersecurity, WiFi by Ken Nero

Apple CEO Tim Cook announces the new iPhone 7 during an event to announce new products, in San Francisco. The blurb for a presentation at the Black Hat Asia hacking conference this week would likely concern any iPhone owner: “The victim will only have to join the Wi-Fi network, and then the device will be compromised without any user interaction, …

View Post

Linksys Routers Attacked by Hijackers Via Flaws

In Cybersecurity, WiFi by Ken Nero

Attackers could exploit the vulnerabilities to crash routers, extract sensitive information from them or take them over The Linksys WRT3200ACM router. Two dozen Linksys router models are vulnerable to attacks that could extract sensitive information from their configurations, cause them to become unresponsive and even completely take them over. The vulnerabilities were discovered by senior security consultant Tao Sauvage from …