Posts by Brice Dickinson
The Groove and Rhythm of Cybersecurity
Finding the Groove in Cybersecurity Using Data Management, Policies, and Configurations to Create Security Baselines. Have you ever listened to a song that really grooved? How about a song that you couldn’t help but dance to? Recently I was listening to Mutemath’s self-titled album from 2006, which is an absolute banger, and found myself unconsciously…
Read More2023: The Year of Cybersecurity
How to Get Ahead of Attackers this Year with Updated Inventories 3 . . . 2 . . . 1 . . . HAPPY NEW YEAR! 2023 has arrived and with the new year comes resolutions, fresh starts, and of course starting new projects. In this article, we will be covering one of the most…
Read MoreSaying Mele Kalikimaka to Malware
Creating a Reliable and Effective Incident Response Process
Read MoreUnderstanding How Service Provider Inventories Can Help Prevent Supply Chain Attacks
Where are Your Meat Trimmings Coming From? Hotdogs are the quintessential summertime-pool-party-grill-out food. At every BBQ in America, especially in July, you can find these cylindrical meat sticks of joy on the grill or lukewarm in a tub on the table, 4 hours after being cooked. In fact every year 20 billion hot dogs are…
Read MoreBrick By Brick: Using Security Awareness Training to Build Robust Defenses
You may think they’re a kid’s toy, but one of my favorite things to do on my days off is building Legos. Ever since I was a kid I have always enjoyed playing and building with Legos and now as an adult, I get to build and display some of the most creative and unique…
Read MoreHow to Create and Implement a Data Recovery Plan
A Hard Lesson in Backups I was 13 years old when I learned why it was important to have good backups. It was 2008 and the new World of Warcraft expansion, Wrath of the Lich King, had just launched and the rest of my friends were already waiting in the game for me. I was…
Read MoreHarnessing AI and Machine Learning for Enhanced Malware Defenses
Malware: Understanding the Threat Now, flash forward 20 some years and the word malware gets thrown around so much these days that it is used to describe so many different computer ailments and has become almost a unanimous term for any computer or internet-related issue that someone might experience. On top of this generalization, cybersecurity…
Read MoreMFA Task Force Evaluates Options for K-12 Districts
The 2020 Pandemic flipped the world upside down and to find any semblance of normalcy, the world turned to technology even further. Every industry was affected by this pivot and arguably none more than Education. And what more, cybercriminals and their threats dramatically rose to meet the unplanned technology changes across schools worldwide. And because…
Read MoreThe Age of the Browser: How to Secure the Browser and Minimize Your District’s Attack Surface
From Computer Labs to Chromebooks When I was in elementary school, we had one computer lab in our library that was filled with old Macintosh computers that were 1 and a half feet by 1 and a half feet cubes that weighed 50 pounds each. Each one had Microsoft Word installed on the machine with…
Read MoreCreating and Maintaining an Audit Log Management Process
If your district does not yet have an Audit Log Management Policy in place, there is no better time than now to get one drafted up. As always, if you are a Forward Edge Cybersecurity Solution customer and need help getting started in the policy creation process or need to review your current policy, our team of certified security professionals is available to assist you in that process.
Read More