BNMC Blog

Bredy Network Management Corporation (BNMC) has been serving the Northeast area since 1988. BNMC works as a strategic business partner to provide organizations with proven design, implementation and support solutions.

FBI Issued "Cybersecurity Advisory" for the K-12 Education Community

On December 10, 2020, the Joint Cybersecurity Advisory (coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC)) issued a major “Cybersecurity Advisory” to the K-12 community.  This advisory reports that cyber actors are targeting kindergarten through twelfth grade (K-12) educational institutions, leading to ransomware attacks, the theft of data, and the disruption of distance learning services. Cyber actors likely view schools as targets of opportunity, and these types of attacks are expected to continue through the 2020/2021 academic year.

These issues will be particularly challenging for K-12 schools that face resource limitations.  Educational leadership, information technology personnel, and security personnel will need to balance this risk when determining their cybersecurity investments.   As you review this Advisory, K-12 schools should be thinking about how they are protecting their students online and verifying they have the proper CyberSecurity controls in place.   It is not good enough to just have the basics of firewall protection, anti-virus and endpoint protection and anti-malware controls.  Now, we need to have Enterprise class Backup and Disaster Recovery solutions (to protect against RansomWare), Security Awareness trainging for all staff  and even students, proper use of Video Conference controls and security and how to best beat Social Engineering attempts.

The Advisory document lists a series of Best Practices at the end of the document.  For further information, contact your BNMC representative or reach out to us to discuss how to better protect your school or business.

0 Comments
Continue reading

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing User Tips Cloud Email Software Privacy Network Security Microsoft Hackers Workplace Tips Business Efficiency Google Computer Data Hardware Hosted Solutions Malware IT Services Communication Internet Mobile Device IT Support Small Business Mobile Devices Smartphone Android Phishing Users Innovation Cloud Computing Tech Term Data Recovery Backup Ransomware Managed IT Services Windows Smartphones Saving Money Cybersecurity VoIP Information Quick Tips Outsourced IT Disaster Recovery Passwords Upgrade Miscellaneous Network Microsoft Office Facebook communications Business Management Windows 10 Social Media Browser Data Backup Office 365 Server Collaboration Business Continuity Managed Service Managed IT Services Productivity Internet of Things COVID-19 Windows 10 Data Management Apps Gadgets Vulnerability Mobile Office Remote Monitoring Information Technology Analytics Infrastructure Gmail Artificial Intelligence Save Money Word App Remote Work WiFi Encryption Government Remote Workers Router Chrome Managed Service Provider Money Spam Conferencing Employer-Employee Relationship Networking VPN Google Drive Applications Access Control Paperless Office Data Security Holiday Settings BYOD Display Company Culture Tip of the week Website IT Support Virtual Reality Managed Services Operating System Employee-Employer Relationship HIPAA BDR Big Data Wi-Fi Bandwidth Computers Virtualization Content Filtering IT Management Business Technology Compliance Virtual Private Network Education Apple Unified Threat Management Storage YouTube Maintenance Robot Firewall Hacker Data storage Risk Management Development Document Management Automation Avoiding Downtime Antivirus Office Tips End of Support Wireless Break Fix Identity Theft Laptop Remote Computing Bring Your Own Device Social Search Training The Internet of Things LiFi Budget Remote Hard Disk Drive SaaS Hosted Solution Mobile Security Humor Administration Best Practice OneNote Cybercrime Mouse Data Breach Downtime Windows 7 Marketing Cryptocurrency Server Management Business Intelligence Going Green Software as a Service Retail Alert Touchscreen Managed IT Data loss Regulations Tablet IT How To Telephone Systems Social Network Free Resource Printing Vendor Blockchain desktop Password MSP Monitors Augmented Reality Vendor Management Managing Stress Chromebook Images 101 iOS Two-factor Authentication Managed IT Service Customer Relationship Management Scam Computing Outlook Solid State Drive FBI Utility Computing Screen Reader Charging Time Management Updates Printer Smart Office Device Reducing Cost Black Friday Wires Corporate Profile Network Congestion Inventory Mixed Reality Licensing Dongle Asset Management Migration Emergency Consulting Assessment Automobile Battery Typing LED Servers Threats Google Calendar Solar G Suite K-12 Education Current Events Laptops Smart Tech Dark Web Writing Peripheral PowerPoint Network Management Work Dell Mobility Batteries Cyber Monday Voice over Internet Protocol WannaCry Shadow IT Cooperation Service Level Agreement Cabling user treats Dark Data Update Memes Hotspot Internet Exlporer Google Maps Files Co-Managed IT Legislation Instant Messaging IT solutions Managed Services Provider Connectivity Microsoft Excel Management Google Docs Onboarding GDPR IT Technicians SharePoint Optimization Hacks Print Toner Myths Modem Smart Technology FinTech Gamification Slack Hard Disk Drives Staff Techology Leominster Politics Shopping Customer Service Google Wallet Messaging Language Lenovo Value Work/Life Balance RMM Bitcoin Content Statistics Huawei Health Private Cloud Entertainment Mail Merge IoT Digital Payment Halloween Office Samsung Policy Business Growth Digital Signage Data Warehouse Mirgation Downloads Recycling Shortcuts Shortcut Mobile Management Cookies Distributed Denial of Service Digital Legal Monitoring VoIP Solid State Drives Unified Threat Management K-12 Schools Meetings Disaster Tech Support Employees Streaming Bluetooth Processor Social Networking Comparison Holidays Unified Communications Drones Firefox Employee-Employer Relationships Computing Infrastructure Superfish Professional Services Banking Windows 8 Distribution Address Hybrid Cloud Star Wars Permissions Scary Stories Social Engineering Procedure Troubleshooting Business Analysis Chatbots eWaste Mobile Device Management Security Cameras Patch Management Profiles Nanotechnology Spyware Running Cable Twitter Deep Learning Spying National Security Wearable Technology User Error Network upgrade Uninterrupted Power Supply Websites Gig Economy Human Error Memory Motherboard Specifications Cables Computer Care IBM Payment Card Analysis Students Alerts USB File Sharing Buisness Reviews Logistics Scalability Fraud Cost Management Sports Safety PCI DSS Alt Codes Heating/Cooling Virus Identity Multi-Factor Security Continuity Virtual Desktop Mobile Computing Point of Sale Ben McDonald shares Personal Information Botnet Cortana Travel 3D Printing Regulation Supercomputer CrashOverride Processors Machine Learning Staffing Motion Sickness Unsupported Software Taxes Administrator Financial IT Budget Web Server what was your? Computer Repair Relocation GPS Mobile Data IT Consultant Recovery How To Cameras Tracking Black Market Cleaning Law Enforcement Electronic Medical Records Notifications CCTV Webcam Physical Security Emoji Upgrades Gadget Error Crowdsourcing Printers

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3