Skip links

Tag: k-12

Acronis SCS K-12 Spotlight Featured Image

K-12 Spotlight

From IT inefficiencies and data security threats to new learn-from-home vulnerabilities, the cyber landscape for K-12 institutions is complex. Adding to that complexity is the fact that schools and districts must often make due with limited IT staffs and budgets, leading to lost productivity and
Cactuscon Blog Featured Image

The Upshot: CactusCon 2019

Why Go? Last weekend, a fellow colleague of mine at Acronis SCS and I had the opportunity to attend Arizona’s premier security conference, CactusCon, in neighboring Mesa. The annual event, which began in 2012 and is now the largest conference of its kind in the
blue chain link

Open Source Backdoors in the Wild

Open Source Backdoors in the Wild Malicious actors will take advantage of any opportunity to exploit an attack vector for money, personal gain, or fun. For years, hackers have used supply chains to deploy backdoors because trusted software provides a relatively easy entry point. This
CyberFit Tips Blog Featured Image

Trick or Treat Yo’self to Our Top 5 Cyberfit Tips

As you get your costumes and candy ready for Halloween, here’s another fun October fact – it’s National Cybersecurity Awareness Month! To help celebrate, Cyberfit Chip’s alter ego, Count Chipula, has turned to the good side this month, so he can offer up key tips to help
Firewall Ports Featured Image

99 Problems but Backup Firewall Ports Aren’t One

How do I love thee network engineer, let me count the ports. 3, that’s right just 3 ports (okay, maybe 5 if you want automated agent installs) you will need to open on your firewalls to get fantastic, fully functional data protection for your entire
Self-Protecting-Data-Diagram Blog Featured Image

Self-Protecting Data – A Future-Proof Cyber Doctrine

The Data Protection Evolution In the decades since cybersecurity became a key priority for companies and federal government agencies alike, we have witnessed a necessary evolution in information security doctrine and strategies. For years, layered data protection tools – from perimeter defense to identity management
Padlock in blue

Implementing a Secure Approach in a Zero Trust World

The Origins of Zero Trust If you keep pace with cybersecurity trends, you have undoubtedly heard the term “zero trust” with increasing frequency in recent years. The term, first coined by Forrester analyst John Kindervag in 2010, and popularized by Palo Alto Networks in years since, refers to a
Edge Data and Higher Education Blog Featured Image

Neglecting the Edge in Higher Education

During recent discussions with a number of IT decisionmakers across the higher education landscape, an interesting trend emerged. Many of these leaders and their IT teams choose to forego backups of mobile endpoints and edge devices, instead entrusting that responsibility to individual users and employees.