BNMC Blog

Bredy Network Management Corporation (BNMC) has been serving the Northeast area since 1988. BNMC works as a strategic business partner to provide organizations with proven design, implementation and support solutions.

FBI Issued "Cybersecurity Advisory" for the K-12 Education Community

On December 10, 2020, the Joint Cybersecurity Advisory (coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC)) issued a major “Cybersecurity Advisory” to the K-12 community.  This advisory reports that cyber actors are targeting kindergarten through twelfth grade (K-12) educational institutions, leading to ransomware attacks, the theft of data, and the disruption of distance learning services. Cyber actors likely view schools as targets of opportunity, and these types of attacks are expected to continue through the 2020/2021 academic year.

These issues will be particularly challenging for K-12 schools that face resource limitations.  Educational leadership, information technology personnel, and security personnel will need to balance this risk when determining their cybersecurity investments.   As you review this Advisory, K-12 schools should be thinking about how they are protecting their students online and verifying they have the proper CyberSecurity controls in place.   It is not good enough to just have the basics of firewall protection, anti-virus and endpoint protection and anti-malware controls.  Now, we need to have Enterprise class Backup and Disaster Recovery solutions (to protect against RansomWare), Security Awareness trainging for all staff  and even students, proper use of Video Conference controls and security and how to best beat Social Engineering attempts.

The Advisory document lists a series of Best Practices at the end of the document.  For further information, contact your BNMC representative or reach out to us to discuss how to better protect your school or business.

0 Comments
Continue reading

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing User Tips Privacy Cloud Email Microsoft Network Security Software Hackers Efficiency Business Data Workplace Tips Hosted Solutions Hardware Computer Google Malware Communication IT Services IT Support Mobile Devices Small Business Smartphone Internet Mobile Device Android Cloud Computing Tech Term Data Recovery Phishing Ransomware Managed IT Services Backup Innovation Smartphones Users Outsourced IT Windows VoIP Saving Money Information Network Cybersecurity Miscellaneous Upgrade Social Media communications Disaster Recovery Data Backup Microsoft Office Browser Passwords Facebook Quick Tips Windows 10 Office 365 Business Continuity Server Business Management Managed Service Managed IT Services Productivity Internet of Things Windows 10 COVID-19 Data Management Apps Analytics App Collaboration Word Artificial Intelligence Gmail Vulnerability Remote Monitoring Remote Work Gadgets Save Money Government Remote Workers Encryption Money Chrome WiFi Router Managed Service Provider Mobile Office Infrastructure Conferencing Tip of the week Website Holiday BYOD Employer-Employee Relationship Networking IT Support Display VPN Spam Access Control Paperless Office Settings Applications Information Technology Google Drive Company Culture Virtual Reality Apple Risk Management Education Maintenance Storage Firewall Office Tips Avoiding Downtime Antivirus Wi-Fi Development Document Management Computers Hacker Data storage Wireless Big Data HIPAA BDR Operating System IT Management Data Security Business Technology Virtual Private Network Robot Content Filtering Bandwidth Automation Unified Threat Management YouTube End of Support Employee-Employer Relationship MSP Remote Computing Augmented Reality Two-factor Authentication Managing Stress Managed IT Service SaaS OneNote Printing Data Breach Password Customer Relationship Management Scam Windows 7 IT Virtualization Laptop Solid State Drive Software as a Service Break Fix Social Network The Internet of Things Search Identity Theft Retail Alert Training Downtime Hard Disk Drive Vendor Outlook Mobile Security Cybercrime Computing Marketing Bring Your Own Device LiFi Server Management Vendor Management Social Monitors Compliance Business Intelligence iOS Humor Chromebook Hosted Solution Touchscreen Best Practice Managed IT Administration Mouse Tablet Data loss How To Regulations Telephone Systems desktop Managed Services Going Green Device Reducing Cost Bluetooth Comparison user treats Cookies Digital Mixed Reality Hacks Firefox Superfish Shadow IT K-12 Schools Scary Stories Meetings Disaster Google Wallet Files Social Networking Migration Consulting Bitcoin Address Permissions Memes Network Congestion Computing Infrastructure Professional Services Running Cable LED Threats Chatbots eWaste Buisness Laptops Business Growth Patch Management Instant Messaging Star Wars PowerPoint User Error Management Uninterrupted Power Supply Mobility Batteries Legal Specifications Shopping Nanotechnology Virtual Desktop Spyware Gamification Writing Wearable Technology Network upgrade Sports Unified Communications Drones Heating/Cooling Multi-Factor Security RMM Motherboard Cables Computer Care IBM Windows 8 Alerts USB File Sharing Co-Managed IT Policy Identity Continuity Managed Services Provider Dark Data Update Fraud Cost Management Onboarding GDPR Time Management Printer Print Toner Myths Deep Learning Black Friday Employees Screen Reader Charging Slack Hard Disk Drives Mobile Device Management Smart Office Huawei Servers Google Calendar Banking Politics Wires Corporate Profile Messaging Emergency Holidays Licensing Dongle Content Procedure Work/Life Balance Solar G Suite Entertainment Alt Codes Dark Web Distribution Customer Service Assessment Automobile Digital Signage Data Warehouse Network Management Dell Shortcuts Mobile Management Cyber Monday Gig Economy Health Private Cloud Smart Tech Monitoring Solid State Drives Office Samsung Work Streaming Processor Budget Legislation Reviews Tech Support Voice over Internet Protocol WannaCry Employee-Employer Relationships Payment Card Cooperation Service Level Agreement Cabling PCI DSS Hybrid Cloud Typing Microsoft Excel Logistics Hotspot Internet Exlporer Google Maps Troubleshooting Business Analysis SharePoint IT Technicians Optimization Security Cameras Profiles Smart Technology FBI Connectivity Spying National Security Current Events Techology Social Engineering Human Error Memory Statistics Remote Websites Modem FinTech Analysis Students Lenovo Inventory Twitter Staff Leominster Halloween Downloads Battery Scalability Cryptocurrency Mail Merge Blockchain Asset Management Language Value Virus Mirgation Recycling Utility Computing Google Docs Shortcut Distributed Denial of Service K-12 Education IoT Digital Payment Updates IT solutions VoIP Unified Threat Management Peripheral Safety Personal Information Botnet Tracking 3D Printing Cleaning Cortana CCTV Webcam Machine Learning Processors Unsupported Software Financial Error Point of Sale Ben McDonald shares Computer Repair Relocation Mobile Data Travel How To Recovery Regulation Supercomputer CrashOverride Mobile Computing Staffing Black Market Motion Sickness Law Enforcement Taxes Administrator Web Server what was your? Electronic Medical Records IT Budget Notifications Physical Security GPS Upgrades Gadget IT Consultant Emoji Printers Crowdsourcing Cameras

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3