Hacker Releases Information on 320,000 Students After District Doesn't Pay Ransom

Table of Contents

Dive into this breaking news story with Office1's Curtis Buhrkuhl & Chad Koch as they discuss why this attack on a Las Vegas School District may have happened, its significance, and what we can learn from it. 

 

Chad Koch has 20 years of IT related experience and 10 years at the teaching level. His wife is a director at a school in Las Vegas and Chad heads the IT of a charter school in Las Vegas. With his vast knowledge of the school system and IT, he was able to prevent multiple attacks from penetrating the school network due to the strong security foundation he created. To tie together his 20 year IT career comes a list of certifications he's received such as A+, Security+, MCSE, and CCNA.

 

Check out the full article here!

 

New call-to-action

Categories: Network Security, Security Breach

blogs related to this

How to Develop a Cybersecurity Strategy

How to Develop a Cybersecurity Strategy

Cybersecurity is perhaps the highest priority for most businesses around the world. And if it isn’t, it should be. That’s primarily because more and...

How to Implement a Cybersecurity Program

How to Implement a Cybersecurity Program

There are a few steps that businesses have to perfect before starting a cybersecurity implementation plan. First, they must conduct a thorough...

Everything You Need To Know About Windows 10 EOL

Everything You Need To Know About Windows 10 EOL

Since its release in July 2015, Microsoft’s Windows 10 has been one of the most widely used and popular operating systems worldwide. For many years,...

Artificial Intelligence Can Help Everyone - Including Scammers. What to Look For.

Artificial Intelligence Can Help Everyone - Including Scammers. What to Look For.

We all knew that artificial intelligence (AI) would be a great disruptor. However, now that the era of AI is upon us, its potential dangers and...

How to Protect Your Business From a Brute Force Attack

How to Protect Your Business From a Brute Force Attack

Data breaches are every business’s worst nightmare. With every passing year, hackers find new ways to gain unauthorized access to enterprises’ IT...

How Scammers Can Use Your Voice Against You

How Scammers Can Use Your Voice Against You

Cybercriminals and scammers can use your voice as a weapon against you. Once upon a time, we might have brushed off the idea of fraudsters using...

Cybersecurity Laws and Regulations to Know About (2024)

Cybersecurity Laws and Regulations to Know About (2024)

As businesses weave cloud computing, edge computing, internet-of-things (IoT), artificial intelligence (AI), machine learning (ML), and myriad other...