Category «cybersecurity»

Five Best Practices for Cloud Security

Microsoft recently published this infographic with examples for securing Azure, but these are best practices that apply to any infrastructure. To Strengthen Access Control, the single most important practice to improve security is to implement multifactor authentication (MFA). Requiring users, especially administrators to use a phone to verify the login goes a long way to …

Training Teachers for Cybersecurity while Working Remotely

decorative

School District superintendents are rightly worried about the risks involved with staff and students working from home. There were risks, of course, during pre-Covid19 times, but now, without the help of a District network protections like filters, firewalls, and logging and a watchful eye of District IT, students and staff are at an increased risk …

Sending sensitive data over email

A colleague of mine asked me about sending sensitive information (personally identifiable information or PII) over email. As a CIO/CTO for 15 years I often get these types of requests. I like these better than being asked to fix the projector at a board meeting. Instead of just telling him that it needs to be …

Close Bitnami banner
Bitnami