- Stephanie from PCMatic - Are we overthinking the K12 Cybersecurity Challenge?
- https://K12cybersecure.com
- Many schools and businesses have spent a lot of time and money on CyberSecurity Solutions, but yet forgot to implement the basics.
- No single product or solution will totally secure your network.
- Don’t get caught up in in the latest buzz words in security.
- BVU Tech Conference May 25-26 - Free, including food.
- https://www.bvu.edu/edtech
- Focused on higher education, but good content for K12
Well, I think i'll go ahead and get started give me just a second Here, Welcome everyone to the May twelfth edition of technology check. In thanks everyone, for showing up today, guess We'll started. have Stephanie Pc. admatic First, on our agenda today. She presented session at it tech That was probably one my favorite ones that teched this spring, thought would be good her coven share most presentation with us, you know we could answer ask any questions stuff want after part it. So i'm gonna turn It over Stephanie. Great! Thank you, Scott. Thanks having me. were session. Matthew there as well, so great see both again. Like. did tech, then will. plan do something similar. in couple weeks Cbu. The point conference. Storm Lake been well received. Am able screen here pull phone? Looks like Everyone it? Okay, Awesome. Okay. yeah. like, Scott said his email it's talking about thinking hyper security general, especially case or 12 space. I'll start off because cow spotted boxes. If are older less recognize these boxes back daily ship this. founder CEO Rob Chang, came from Gateway 20 plus years ago. He senior Vice President there, when he left created what is now known Pcmatic. My mother actually back, worked gateway well. she board Cheng help him company. They needed company headquarters an address out country, they use mom's house address. i say, i've here. full time 5 years. but more grew pcmatic headquarters, which still Sioux City iowa day, we've got 60 employees nationwide all way east coast west coast. But City, Iowa. We've handful management pesmatic kind goes show culture. We deep roots community stems old computers location city. That's little backstory us where agenda. I'm ransom exactly fueling That, however, somewhere happening called shiny objects. Syndrome examples take guys basic why matters. We're talk prevention drop high-level overview do, how tie into conversation include resources presentations. don't wanna sit your ears Give some. Take K. cybersecurity. Com resource will act. This map done by organization their website end reported incidents schools around nation different cyber attacks rates I've interacted. can website. click toggle read happen. if you're not familiar definitely recommend check out. Why does rain somewhere? Most us? Some already nowhere encrypts data computer, cannot Mac without key attackers demand key. actual between attacker administrator director school. Essentially he's asking 40 million dollars. dollars public And Ip comes says, Really, mistake. Are extra 0 number there's no you. says. according records, amount money we're what's required. again I'm. confused. school means free students can't possibly anything close this? continues chats forth, ultimately says money. teacher salaries sooner resources. There's mean you've figure show. mean, even ransomware possibility is, know, example happen anyone public. private. Small Iowa hit ransomware, For some reason Why, viable business model. Anyone, dark web, purchase kit $10, $100,000 revenue. All conversion rate that. study shows 45 60%. chunk people victims ransomer paying ransom. lack It's opportunistic bring insurance homeowners, car insurance. critical. talked districts over. Who said, requirement policy place, critical backstop many ransomware. finding organizations policies place targeted requiring we're. somehow evidence adjust random demands. There shared attack cover page provide hit, policy, much. going much circle, that's case, else should doing? reasons happening. inbox right? 90% delivered through large majority lot us. Probably aren't isn't news sure either ourselves staff, maybe getting fishing attempt right. breakdown 60% educational experience attempts. every day 33% those had account. compromise, attack, 27% somewhere. According report 2020. animals call identify 1. You look set spam right indicator other things understand them training world, right, find someone shouldn't believe true. inbox. happening? tools Not anywhere. they're failing. traditional blacklist antivirus software solutions equipped stay date newest latest thread. 75% running updated software. need doing prevent happening, typically enough anymore. takes object syndrome tendency focus greatest products. Ideas trends frequently expense foundational best practice. object? What things? sure, heard buzzwords. may implemented Ed. R. X. Trust. So, detecting regulations, tools, industry buzz mission possible level security. locking front door begin with, saying detect happened. remediate reactive to, remembering first objects, why, forgetting basics matter? cornia pipeline. largest fuel pipeline Us. Actually led shortages across coast, result single compromise password. Okay? spend security? since 2 17? last few hired independent firms risk assessment, increase it, spending than 50% minute specifying tens millions think, You've good. Oh, down password basics. Here's another one. water treatment play h Florida, made Both outdated windows 7 operating. Systems. systems layers keep safe. window. Something operating system. Let plant attacked cooperative based farm service provider. Ransom Recent Ransomware attack. Recently discovered hundreds, 653, exact, instances breached credentials. credential? Their chicken. One. 120 using same password, used 10 times again, basics, chicken, simple Artford postpone classes following shut entire district sharing city government. spent $500,000 upgrading ready go. year system weren't Michigan schools, examples. Just Jeremy Seth, near seventh graders. Michigan. username post. note across. hey? Let's gets into. login passwords. access phone numbers, locker combinations, lunch balances, grades 15,000 classmates. district. get? tests. Teachers test keys emails. control cameras. remote phones. Another needed, staff hand, 4 display, grade boys necessarily sufficient. Can doesn't complicated coming base 6 hygiene, hygiene. Dallas county, who fault students. anyone. supposed video Cyber world cybersecurity ran Basically always seems Or feel matter feudal. Jenny's early she's directive Director Cisa, said. Yes, sophisticated, highly dedicated actors there. prevented incredibly important. Kirsten, overthinking threat bare secure infrastructure tax seeing preventable. investing impossible solutions. bothering lock door? basics? We, remember about, making priority. Make ongoing. about. taught, classroom while days, so. taught before board, typical while. thinking, teachers come understanding How important train them, make ongoing once. yearly thing, mind backups rely recovery. basic, doing. storing separately multi factor. Authentication Again, teaching days. love teacher, multi-factor authentication classroom, trying teach logged devices. No, didn't live easier logging add layer protection happens implement soon possible, requirement. Now protection. too antivirus. blacklist. Reactive approach. that'll application allow listing lightlisting. slide change bit, realized bit differently yourself. say either, proposition. When security, starting layered also preventative network Your firewall Then looking endpoint, edr tools. Come respond prevention? whitelist solution normally. additional top black list place. realize, education shining Edr reacting working you? Application white listing. gold standard endpoint default, approach basically rather reaction blocking everything. bad network. flipping only applications execute Block unknown application. whitelisting Default denying recommended Miss Sisa FBI department playing that's. consumer work districts, state local A effective really truly rapidly evolving forms each minimal limited required alongside alone, yourself economical. high price. practical. absolutely many, thousands endpoints K space, tell customers particular Texas who's person women. teachers, too, technology, teacher. dealing problem. practical easy have. mentioned beginning It's. 12, dot com. showed presentation, threat, intelligence Hub atom preventing mitigating threats nation. nonprofit We'd partner webinars Them conversations school, Kate com open questions. visit contact information happy email, whatever information, Again. thank Scott, me, Is storm, like? surely meet got. Alright, Anyone Alright. we'll program specifically. How? process application? box. install workstation, require some? Yeah, if, work, specify push machines updates work? sure. hear year's holy moly. am deploy school? Do build own available whitlisting deny solution. hundreds global light list. product district, malware research team has added list, thing proprietary never seen before. whiteless listed run instance options. let's blocked automatically uploaded cloud arm determine whether it'll pushed customers. issue director, try automated process, scratch possible. environment gotten digital signatures wait already? Same. Yep. What? platforms support? support windows, servers. towards linux server works. Macs support. chromebooks. chromebook plugin, course product, Because books fairly secure, chrome plugin ad blocker sort thing. different. client pricing finds workstations. assuming Yeah priced higher Than endpoint. workstation. Ms: installation Hopefully, forget there? I'm: notifications tries run? allowed them. yeah, pick mac once installs. then, kinds sent email. Whether ways. notification alerted real Anybody questions? hearing none, Thanks, , presenting agree issues. yep notable. Well notified. Mfa required, scrambling put yeah yup notice trends. Can, conferences over, Mfa: People insurance, great. Right conservative So. very pleasure. ever hesitate reach enjoyed weeks. Sounds Thanks. that, next Agenda item, Bvu conference expert room. Sarah. reminder same. qualified. May. calendar here, told dates week fifth 26 register cost Joe described Cio, whatever. First all, asked brainstorm places blah blah, did. applies ed interested know. input had. entirely selling things. presentation. saw helpful things, force instead shilling products drives crazy, offer anyway. keeping clear. registered like. alright let gave link before, notes, B view web. copied week. bullet points notes. Section year? Kind processes storm new employee mainly auditorium theater Bbu main job. office, Checking repairing chromebooks troubleshooting, haven't hardly There, summer sudden concern oh, God, leave, involved hard backtrack. week, plans suddenly dawned round. gotta handle He's great, chances everything's working, deal turning Ecf form hopefully turned invoices previous ecf 10,000 questions, mess till late, they'll pay subscriptions period bills delivery date, sending send services. started, job chaos. makes nervous nervous, it'd nice back. then. wasn't won't applied for. finish year. finished buying everything morning. yet, although count glasses ones, toying with. kindergarten giving graders student keeps updates, lasting longer, kindergarteners fourth grade, admins, kids summer, heck 2,900 bringing kinder, kinders not. happened year, solve 4, hope works Os. question physical box bought 8 pretty 49, mean. longer hps, anyway, luck repeat offenders break guess. update, sarah Mr. shelling biggest devices departing, seem write effect apply yesterday 80 rotation plight home point. one-to-one home, found grand proper wording x percent pot depending more, touch proposal dollar amounts eighth receive chromebook. tuition $50 walk away Tom ae far out, college, hopefully, long Sarah's breaks heart institution. bid horrifying seniors until throw away. okay, spot plan, written finance council, present Board including foundation fund needs approve first, finance, Yada Yada. otherwise? quiet. matthew together diocese. Schools directors June. websites contract 3 months. provider month cancellation contract. decisions later. topic topics sir. naturally. move along. Get wireless vendors phones, plays Did had, bids. They? through, currently have, reuse wiring forth. sounds update Jason. What's battle. Plan summer. School ending quick sorry anybody. Sorry, ask, anybody waiting cat yet e on, requests granted, approved firewall. wanted allocation cost. Allocation. vendor. vendor percentage, decimal $30 difference versus in, one's under review hadn't wave upfront, They'll weighing category years, info signed quite fiber. costs 14 something, cheap buildings sorts comparison fibers stuff, comparing anything. went tried bids none sitting Wait still, cause options huge seen. fiber cities posted guess, look. Pam strange multi-year questioning initial forcing was, built $14,000 infrastructure, switches gosh, yes! ago, improve Internet asked. good, cool. whole evaluation assessments group recommendation purchase. purchasing Lori together. for, State properly excited opportunity encourage advantage might offset companies discounts. certain past, mfa, cyber, Next somebody contacted at. greg insight financial leasing protectable budgets lead on. It. 26. Pelosi time. Hell lockdown block doors, alerts active shooter building Company. pools based, powers be, included does. is. disparate become alert sounded familiar. wrong worries I. homeworld bandit looks impressive. duplicateable. enjoy rest