Hacker Releases Information on 320,000 Students After District Doesn't Pay Ransom

Table of Contents

Dive into this breaking news story with Office1's Curtis Buhrkuhl & Chad Koch as they discuss why this attack on a Las Vegas School District may have happened, its significance, and what we can learn from it. 

 

Chad Koch has 20 years of IT related experience and 10 years at the teaching level. His wife is a director at a school in Las Vegas and Chad heads the IT of a charter school in Las Vegas. With his vast knowledge of the school system and IT, he was able to prevent multiple attacks from penetrating the school network due to the strong security foundation he created. To tie together his 20 year IT career comes a list of certifications he's received such as A+, Security+, MCSE, and CCNA.

 

Check out the full article here!

 

New call-to-action

Categories: Network Security, Security Breach

blogs related to this

Cybersecurity Laws and Regulations to Know About (2024)

Cybersecurity Laws and Regulations to Know About (2024)

As businesses weave cloud computing, edge computing, internet-of-things (IoT), artificial intelligence (AI), machine learning (ML), and myriad other...

What is the Difference Between MDR and Endpoint Detection & Response (EDR)?

What is the Difference Between MDR and Endpoint Detection & Response (EDR)?

The cybersecurity market is booming and enterprises have thousands of security solutions to choose from. However, two security solutions hover over...

What is Endpoint Detection & Response (EDR)?

What is Endpoint Detection & Response (EDR)?

An endpoint is any device connected to an enterprise network. Security teams have focused on protecting enterprise endpoints from threats and...

What is Managed Detection and Response (MDR)?

What is Managed Detection and Response (MDR)?

With every passing year, it becomes more evident that cybersecurity must be the strongest pillar in every organization. Businesses lose millions...

Top 10 Cybersecurity Strategy Tips For 2024

Top 10 Cybersecurity Strategy Tips For 2024

While 2024 has many exciting things in store for enterprises, it is also rife with potent cybersecurity threats. Businesses will be in the crosshairs...

How To Implement Zero Trust

How To Implement Zero Trust

Cybersecurity becomes increasingly complex with every passing year. The dynamic nature of modern cloud-based operations means that enterprise attack...

Malware and Ransomware Protection for Internet of Things (IoT) Devices

Malware and Ransomware Protection for Internet of Things (IoT) Devices

Malware has been around for quite a few years, and it continues to bring businesses down to their knees. Ransomware, in particular, was a nuisance...