Hacker Releases Information on 320,000 Students After District Doesn't Pay Ransom

Listen Now

Table of Contents

Dive into this breaking news story with Office1's Curtis Buhrkuhl & Chad Koch as they discuss why this attack on a Las Vegas School District may have happened, its significance, and what we can learn from it. 

 

Chad Koch has 20 years of IT related experience and 10 years at the teaching level. His wife is a director at a school in Las Vegas and Chad heads the IT of a charter school in Las Vegas. With his vast knowledge of the school system and IT, he was able to prevent multiple attacks from penetrating the school network due to the strong security foundation he created. To tie together his 20 year IT career comes a list of certifications he's received such as A+, Security+, MCSE, and CCNA.

 

Check out the full article here!

 

New call-to-action

Categories: Network Security, Security Breach

blogs related to this

Top 13 Cybersecurity Strategy Tips For 2025

Top 13 Cybersecurity Strategy Tips For 2025

A stale cybersecurity strategy is a weak cybersecurity strategy. That’s why it’s of paramount importance for businesses to acknowledge new...

Cybersecurity Laws and Regulations to Know About (2025)

Cybersecurity Laws and Regulations to Know About (2025)

2025 will see dramatic advancements in technologies like artificial intelligence (AI), cloud computing, quantum computing, machine learning (ML),...

What is the Cost of Managed Cybersecurity Services?

What is the Cost of Managed Cybersecurity Services?

Before we delve into the cost of cybersecurity, let’s briefly look at the cost of neglecting cybersecurity. Why are we doing this? Because this will...

Differences Between Malware and Ransomware Protection

Differences Between Malware and Ransomware Protection

Cybercrime is more rampant now than ever before. Cybercriminals use advanced technologies to deploy cyberattacks at a previously unimaginable scale...

Don't Risk Your Data: Employee Errors That Could Cost You

Don't Risk Your Data: Employee Errors That Could Cost You

Across the world, enterprises are becoming increasingly aware of cyber threats. Modern cyber threats include malware, ransomware, phishing (a type of...

How to Develop a Cybersecurity Strategy

How to Develop a Cybersecurity Strategy

Cybersecurity is perhaps the highest priority for most businesses around the world. And if it isn’t, it should be. That’s primarily because more and...

How to Implement a Cybersecurity Program

How to Implement a Cybersecurity Program

There are a few steps that businesses have to perfect before starting a cybersecurity implementation plan. First, they must conduct a thorough...