Hacker Releases Information on 320,000 Students After District Doesn't Pay Ransom

Listen Now

Table of Contents

Dive into this breaking news story with Office1's Curtis Buhrkuhl & Chad Koch as they discuss why this attack on a Las Vegas School District may have happened, its significance, and what we can learn from it. 

 

Chad Koch has 20 years of IT related experience and 10 years at the teaching level. His wife is a director at a school in Las Vegas and Chad heads the IT of a charter school in Las Vegas. With his vast knowledge of the school system and IT, he was able to prevent multiple attacks from penetrating the school network due to the strong security foundation he created. To tie together his 20 year IT career comes a list of certifications he's received such as A+, Security+, MCSE, and CCNA.

 

Check out the full article here!

 

New call-to-action

Categories: Network Security, Security Breach

blogs related to this

DNS Hijacking: What it is and How to Protect Your Business

DNS Hijacking: What it is and How to Protect Your Business

DNS hijacking is a serious cyber threat to businesses. A DNS or Domain Name System is like a phonebook but for the whole internet. Domain names such...

How to Implement a Cybersecurity Program for Your Business

How to Implement a Cybersecurity Program for Your Business

Even if your business doesn’t operate in the critical infrastructure sectors, a robust security posture is essential to maintain business continuity...

Top 13 Cybersecurity Strategy Tips For 2025

Top 13 Cybersecurity Strategy Tips For 2025

A stale cybersecurity strategy is a weak cybersecurity strategy. That’s why it’s of paramount importance for businesses to acknowledge new...

Cybersecurity Laws and Regulations to Know About (2025)

Cybersecurity Laws and Regulations to Know About (2025)

2025 will see dramatic advancements in technologies like artificial intelligence (AI), cloud computing, quantum computing, machine learning (ML),...

What is the Cost of Managed Cybersecurity Services?

What is the Cost of Managed Cybersecurity Services?

Before we delve into the cost of cybersecurity, let’s briefly look at the cost of neglecting cybersecurity. Why are we doing this? Because this will...

Differences Between Malware and Ransomware Protection

Differences Between Malware and Ransomware Protection

Cybercrime is more rampant now than ever before. Cybercriminals use advanced technologies to deploy cyberattacks at a previously unimaginable scale...

Don't Risk Your Data: Employee Errors That Could Cost You

Don't Risk Your Data: Employee Errors That Could Cost You

Across the world, enterprises are becoming increasingly aware of cyber threats. Modern cyber threats include malware, ransomware, phishing (a type of...