Top Tips
How to Create and Implement a Data Recovery Plan
A Hard Lesson in Backups I was 13 years old when I learned why it was important to have good backups. It was 2008 and the new World of Warcraft expansion, Wrath of the Lich King, had just launched and the rest of my friends were already waiting in the game for me. I was…
Read MoreHarnessing AI and Machine Learning for Enhanced Malware Defenses
Malware: Understanding the Threat Now, flash forward 20 some years and the word malware gets thrown around so much these days that it is used to describe so many different computer ailments and has become almost a unanimous term for any computer or internet-related issue that someone might experience. On top of this generalization, cybersecurity…
Read MoreThe Age of the Browser: How to Secure the Browser and Minimize Your District’s Attack Surface
From Computer Labs to Chromebooks When I was in elementary school, we had one computer lab in our library that was filled with old Macintosh computers that were 1 and a half feet by 1 and a half feet cubes that weighed 50 pounds each. Each one had Microsoft Word installed on the machine with…
Read MoreNew Look, New Feel, New Features…SAME Spark of Joy!
Change can be fun, interesting, and productive. It often comes with diligent efforts to bring something new into focus that is beneficial to everyone. We have been hard at work all year implementing some big changes coming to Edge•U this summer. We’re so excited to share it as there are some amazing new features!
Read MoreRansomware and How to Protect Your District (by Scott Augenbaum)
It’s fair to say that “Ransomware Attacks” are on the rise. Protect your district with these best practices from former FBI Agent, Scott Augenbaum.
Read More10 Tips on Reducing Stress at the Start of the School Year
One Password to Rule Them All!
5 Steps to Protect PII
A Practical Guide For Protecting Our Most Important Information It seems that week after week there is a new story in the news about yet another company suffering a data breach. It has become so commonplace now that only the truly large breaches make the headlines. But despite truly staggering numbers of data breaches, many…
Read More