Posts by Brice Dickinson
The Groove and Rhythm of Cybersecurity
Using Data Management, Policies, and Configurations to Create Security Baselines. Have you ever listened to a song that really grooved? How about a song that you couldn’t help but dance to? Recently I was listening to Mutemath’s self-titled album from 2006, which is an absolute banger, and found myself unconsciously bobbing my head and tapping…
Read More2023: The Year of Cybersecurity
How to Get Ahead of Attackers this Year with Updated Inventories 3 . . . 2 . . . 1 . . . HAPPY NEW YEAR! 2023 has arrived and with the new year comes resolutions, fresh starts, and of course starting new projects. In this article, we will be covering one of the most…
Read MoreSaying Mele Kalikimaka to Malware
Creating a Reliable and Effective Incident Response Process
Read MoreUnderstanding How Service Provider Inventories Can Help Prevent Supply Chain Attacks
Where are Your Meat Trimmings Coming From? Written By Cybersecurity Engineer Brice Dickinson Hotdogs are the quintessential summertime-pool-party-grill-out food. At every BBQ in America, especially in July, you can find these cylindrical meat sticks of joy on the grill or lukewarm in a tub on the table, 4 hours after being cooked. In fact every…
Read MoreBrick By Brick 
Written By Cybersecurity Engineer Brice Dickinson Using Security Awareness Training to Build Robust Defenses You may think they’re a kid’s toy, but one of my favorite things to do on my days off is building Legos. Ever since I was a kid I have always enjoyed playing and building with Legos and now as an…
Read MoreThe Backup Plan
How to Create and Implement a Data Recovery Plan
Read MoreBeep. Boop. Eliminated.
Harnessing AI and Machine Learning for Enhanced Malware Defenses
Read MoreMFA Task Force Evaluates Options for K-12 Districts
The 2020 Pandemic flipped the world upside down and to find any semblance of normalcy, the world turned to technology even further. Every industry was affected by this pivot and arguably none more than Education. And what more, cybercriminals and their threats dramatically rose to meet the unplanned technology changes across schools worldwide. And because…
Read MoreThe Age of the Browser
How to secure the browser and minimize your district’s attack surface
Read MoreIt’s 10 PM; Do You Know Where Your Logs Are?
If your district does not yet have an Audit Log Management Policy in place, there is no better time than now to get one drafted up. As always, if you are a Forward Edge Cybersecurity Solution customer and need help getting started in the policy creation process or need to review your current policy, our team of certified security professionals is available to assist you in that process.
Read More