Recently, the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the MultiState Information Sharing and Analysis Center (MS-ISAC) released a joint advisory regarding increased criminal activity directed toward information systems and student data of K-12 Schools.
Third Party Educational Technology Vendor Management
Schools are increasingly reliant on technology for business operations, student and staff information systems, and remote teaching and learning.
School Security: The Importance of Planning, Training, and Collaboration
chool leaders continue to face ever-evolving threats and hazards, from school violence to a Global Pandemic. Safety and security strategies must evolve to provide the safest environment possible for students and staff.
Information Security 101 : FBI K-12 Distance Learning Warnings and What to do next?
For most IT professionals working at K-12 schools, every day is challenging and even more so over the last 12 months. Porzio Compliance Services continues to receive inquiries from districts about what to do about these warnings.
What is: Data Classification Policy
Data classification policies establish criteria for ranking data based on the resulting impact of loss or theft on an organization.
The California Consumer Privacy Act (“CCPA”) is Now Effective: What Does It Mean for Your Business?
Did you know? The California Consumer Privacy Act of 2018 (the “CCPA”), one of the most stringent and far-reaching consumer privacy laws in the country, became effective as of January 1, 2020. The CCPA significantly expands the privacy rights of California consumers by imposing new requirements on businesses to disclose what categories of personal information will be collected, the purpose …
Finding Vulnerabilities is a Good Thing
No matter how cautious a company is in designing and defending its information security systems, there is always the potential for data breaches and cybersecurity incidents. One method to find these vulnerabilities before a threat actor does is to test your security using some of the same techniques that criminals do, first. Penetration tests cause no actual damage if conducted by a reputable professional, and can be a vital tool for understanding a particular weakness in more than Information Technology systems.
A Risk Assessment Will Identify a Path to Success
A risk assessment is a process to uncover gaps and to document a road map for better cybersecurity practices and organizational resilience. It can often determine the cost and likelihood of an incident while quantifying the need for security spending.
Incident Response Planning: Having a Play in Your Playbook
An Incident Response Plan is an operational playbook that helps minimize the financial and reputational impact caused by an incident for an organization. By creating an Incident Response plan and team, organizations respond better to cybersecurity incidents, quickly resuming normal business operations, and promptly alerting relevant stakeholders, authorities, and regulatory agencies to meet all regulatory requirements.