In the News: Schools Struggle to Keep Pace With Hackings, Other Cyber Threats

As quoted in: Herold, Benjamin. “Schools Struggle to Keep Pace With Hackings, Other Cyber Threats.” Education Week. 29 November 2017. All told, at least 235 […]

Security Awareness Tips for LMS Administrators

  Keeping Your SaaS Data Secure As the software industry continues to move away from purchased client/server applications and toward cloud-based SaaS (software as a […]

Luxembourg and Cyber-Security: HOW did it START?

.   . Luxembourg and Cyber-Security: HOW did it START? . Luxembourg, a tiny country with ONLY 590.667 inhabitants (January 2017) in the heart of […]

In The News: Hackers Target Nation’s Schools

As quoted in: Hobbs, Tawnell D. “Hackers Target Nation’s Schools.” Wall Street Journal. 23 October 2017. Cyber experts say schools need to be proactive in […]

On the Air: Hackers Target Student Data as Schools Report Increasing Cyberattacks

As interviewed by Todd Zwillich on WNYC’s The Takeaway (“Hackers Target Student Data as Schools Report Increasing Cyberattacks“). .

Three Lessons from the Google Docs Phishing Scam: K-12 Education Edition

Earlier this week, an unknown person or persons launched a short-lived, but clever cyber attack against Google Docs' users. While apparently not targeted toward schools, […]

In the News: Hackers Are Targeting Schools

As quoted in: Cox, Joseph. “Hackers Are Targeting Schools in a Wave of Tax Info Phishing Attacks.” Motherboard. 13 February 2017. “There is a pretty […]

IRS Official to Schools: “One of the Most Dangerous Email Phishing Scams We’ve Seen”

“This is one of the most dangerous email phishing scams we’ve seen in a long time. It can result in the large-scale theft of sensitive […]

SID2017: Safer Internet Day 2017-Participation

. Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html . Safer Internet Day 2017 – Save the date!. Safer Internet Day (SID) is organised by Insafe in February of each year […]

Why None of us are Above Cyber Attacks: How Hackers Broke into John Podesta and Colin Powell’s Gmail Accounts

It’s fair to say that when it comes to high profile cyber security failures, the past twelve months have seen more than their fair share. […]

8 Signs Your Mobile Device May Be Compromised Without Your Knowledge

In the wake of an apocalypse targeting our mobile devices, we need anti-virus programs, secure firewalls, toolkit detection, and of course, a flamethrower. The post […]

A Holistic View Of WHAT Will Influence EDUcation In The Future

. . WHAT Will Influence EDUcation In The Future? Through ICT the Real-World and especially the Virtual-World (both are influencing each other…) are changing quicker […]

LOAD MORE
We are updating our Privacy Policy, so please make sure you take a minute to review it. As of May 25, 2018 your continued use of our services will be subject to this new Privacy Policy.
Review Privacy Policy OK