BNMC Blog

Bredy Network Management Corporation (BNMC) has been serving the Northeast area since 1988. BNMC works as a strategic business partner to provide organizations with proven design, implementation and support solutions.

FBI Issued "Cybersecurity Advisory" for the K-12 Education Community

On December 10, 2020, the Joint Cybersecurity Advisory (coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC)) issued a major “Cybersecurity Advisory” to the K-12 community.  This advisory reports that cyber actors are targeting kindergarten through twelfth grade (K-12) educational institutions, leading to ransomware attacks, the theft of data, and the disruption of distance learning services. Cyber actors likely view schools as targets of opportunity, and these types of attacks are expected to continue through the 2020/2021 academic year.

These issues will be particularly challenging for K-12 schools that face resource limitations.  Educational leadership, information technology personnel, and security personnel will need to balance this risk when determining their cybersecurity investments.   As you review this Advisory, K-12 schools should be thinking about how they are protecting their students online and verifying they have the proper CyberSecurity controls in place.   It is not good enough to just have the basics of firewall protection, anti-virus and endpoint protection and anti-malware controls.  Now, we need to have Enterprise class Backup and Disaster Recovery solutions (to protect against RansomWare), Security Awareness trainging for all staff  and even students, proper use of Video Conference controls and security and how to best beat Social Engineering attempts.

The Advisory document lists a series of Best Practices at the end of the document.  For further information, contact your BNMC representative or reach out to us to discuss how to better protect your school or business.

0 Comments
Continue reading

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing User Tips Cloud Privacy Email Microsoft Network Security Software Hackers Efficiency Business Data Workplace Tips Hosted Solutions Hardware Computer Google Malware Communication IT Services IT Support Mobile Devices Small Business Mobile Device Internet Smartphone Android Cloud Computing Tech Term Backup Ransomware Data Recovery Managed IT Services Phishing Innovation Smartphones Users Saving Money Windows VoIP Outsourced IT Upgrade Miscellaneous Cybersecurity Network Information Social Media communications Disaster Recovery Quick Tips Microsoft Office Windows 10 Passwords Browser Facebook Data Backup Office 365 Business Continuity Business Management Server Managed IT Services Productivity Managed Service Internet of Things Apps COVID-19 Windows 10 Data Management Remote Monitoring Analytics App Remote Work Artificial Intelligence Gmail Collaboration Gadgets Word Save Money Vulnerability Government Router Mobile Office Infrastructure Encryption Conferencing Money WiFi Chrome Remote Workers Managed Service Provider Employer-Employee Relationship Networking Virtual Reality Access Control VPN Applications Paperless Office Website Holiday BYOD Company Culture Display IT Support Spam Tip of the week Settings Information Technology Google Drive HIPAA YouTube End of Support BDR Apple Risk Management Education Storage IT Management Data Security Business Technology Office Tips Virtual Private Network Wi-Fi Computers Unified Threat Management Hacker Data storage Big Data Employee-Employer Relationship Maintenance Operating System Firewall Avoiding Downtime Antivirus Development Document Management Robot Automation Content Filtering Wireless Bandwidth Search Identity Theft Going Green Training Remote Computing Hard Disk Drive Vendor Mobile Security Printing Server Management SaaS Touchscreen Compliance Business Intelligence iOS Password Virtualization Laptop Managed IT Tablet Data loss How To The Internet of Things Retail Alert Regulations Telephone Systems desktop Managed Services Computing Downtime MSP Outlook Cybercrime Augmented Reality Two-factor Authentication Marketing Managing Stress Bring Your Own Device Monitors LiFi Managed IT Service Vendor Management Social OneNote Hosted Solution Data Breach Humor Customer Relationship Management Scam Chromebook Administration Best Practice Windows 7 IT Solid State Drive Software as a Service Mouse Break Fix Social Network Smart Office Print Toner Myths Black Friday Employees Screen Reader Charging Slack Cryptocurrency Hard Disk Drives IT solutions Content Huawei Servers Google Calendar Safety Banking Wires Corporate Profile Messaging Google Docs Emergency Holidays Licensing Dongle Network Management Procedure Scary Stories Solar G Suite Entertainment Dark Web Distribution Assessment Automobile Digital Signage Hacks Data Warehouse Running Cable Work Dell Shortcuts Google Wallet Mobile Management Cyber Monday Gig Economy Smart Tech Monitoring Bitcoin Solid State Drives Network Congestion Cabling Streaming Processor Legislation Reviews Buisness Voice over Internet Protocol WannaCry Business Growth Employee-Employer Relationships Payment Card Cooperation Service Level Agreement SharePoint Writing PCI DSS Sports Legal Hybrid Cloud Microsoft Excel Logistics Hotspot Virtual Desktop Internet Exlporer Google Maps Troubleshooting Business Analysis IT Technicians Optimization Unified Communications Security Cameras Drones Profiles Smart Technology FBI Connectivity Spying Windows 8 National Security Techology Human Error Memory Statistics Remote Modem FinTech Analysis Students Lenovo Dark Data Inventory Update Staff Leominster Mobile Device Management Virus Downloads Battery Deep Learning Scalability Mail Merge Blockchain Asset Management Language Value Peripheral Mirgation Recycling Utility Computing Shortcut Distributed Denial of Service K-12 Education Politics IoT Digital Payment Updates VoIP Unified Threat Management K-12 Schools Meetings Disaster Device Reducing Cost Bluetooth Comparison user treats Work/Life Balance Cookies Digital Alt Codes Mixed Reality Firefox Superfish Customer Service Shadow IT LED Threats Office Files Samsung Social Networking Migration Consulting Address Permissions Memes Health Private Cloud Computing Infrastructure Professional Services Management Chatbots eWaste Laptops Budget Patch Management Instant Messaging Tech Support Star Wars PowerPoint User Error Wearable Technology Network upgrade Uninterrupted Power Supply Mobility Batteries Specifications Shopping Nanotechnology Spyware Typing Gamification Co-Managed IT Current Events Heating/Cooling Multi-Factor Security Social Engineering RMM Motherboard Cables Computer Care IBM Alerts USB File Sharing Time Management Printer Policy Twitter Halloween Identity Continuity Managed Services Provider Websites Fraud Cost Management Onboarding GDPR Point of Sale Ben McDonald shares Upgrades Gadget Emoji Crowdsourcing Travel Personal Information Botnet 3D Printing Regulation Supercomputer CrashOverride Cortana Motion Sickness Staffing Processors Taxes Machine Learning Administrator Web Server what was your? Unsupported Software IT Budget GPS Printers IT Consultant Computer Repair Relocation Cameras Mobile Data How To Tracking Recovery Mobile Computing Cleaning Black Market CCTV Webcam Law Enforcement Financial Notifications Electronic Medical Records Physical Security Error

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3