This is email based cyberattack that tricks users into giving up personal information
What is Phishing?
This type of software scans endpoints for vulnerabilities?
What is a Vulnerability Scanner?
A cybersecurity process that involves collecting, analyzing, and reviewing network data for signs of malicious activity or unauthorized access.
What is Network Security Monitoring?
This authorized cyber attack from outside of your network that helps to identify exploitable systems, software vulerabilities, access to your systems.
What is a Penetration Test?
SOC
What is Security Operations Center?
This type of malware encrypts files and demands payment for decryption.
What is ransomware?
This security tool continuously monitors endpoints for suspicious activities and provides real-time detection of threats.
What is Endpoint Detection and Response (EDR)?
This service protects endpoints, such as desktops, servers, laptops, and virtual machines, extending security from known signatures to patters to detect & prevent sophisticated attacks on the endpoint.
What is Managed Endpoint Detection & Response (MEDR) or EDR?
This professional service evaluates a school district’s people, processes, and technology to identify gaps and provide a roadmap aligned to NIST, CIS, CCRE and K–12 best practices.
What is a Cybersecurity Risk or Maturity Assessment?
PAM
What is Privileged Access Management, which secures and monitors administrator and high-risk accounts within a school district?
This attack targets K12 business offices by compromising or impersonating a leaders email accounts, often to authorize fraudulent wire transfers.
What is Spoofing?
Security Teams use this technology to collect, analyze and correlate security alerts from multiple sources.
What is a Security Information and Event Management system (SIEM / aka XDR)?
This service protects students and staff by filtering malicious or inappropriate content while helping districts meet CIPA compliance requirements.
What is Managed Web Content Filtering?
This facilitated exercise tests your knowledge and execution of your incident response plan to help enable collaboration and identify gaps in a lower stress environment.
What is a Tabletop Exercise?
SIEM
What is Security Information and Event Management, a platform that aggregates and analyzes security logs across district systems?
These attacks trick individuals into breaking normal security procedures by exploiting human psychology rather than technological vulnerabilities.
What is social engineering?
This technology creates a logical isolated virtual environment to safely execute suspicious files or code?
What is a sandbox?
This service actively searches, scans, and collects data from dark web sources to identify potential cybersecurity threats and stolen information.
What is dark web monitoring?
This service helps districts design a modern security framework that assumes no user or device is trusted by default, even inside the school network.
What is Zero Trust Architecture Design?
DLP
What is Data Loss Prevention, the technology that helps prevent sensitive student and staff data from being leaked or exfiltrated?
This increasingly common attack method targets trusted third-party vendors or software providers to compromise their customers, allowing attackers to affect multiple organizations with a single breach.
What is Supply Chain Attacks?
This cloud security technology can identify and remediate misconfigurations.
What is Cloud Security Posture Management (CSPM)?
This service ensures school systems and student data can be rapidly restored after ransomware, hardware failure, or natural disasters through secure backups and recovery testing.
What is Managed Backup and Disaster Recovery (BDR)?
This emergency services helps organizations rapidly investigate, contain and remediate active security breaches to minimize organizational damage.
What is Incident Response?
DRaaS
What is Disaster Recovery as a Service, a cloud-based approach to restoring critical school systems after ransomware or outages?