Schools Have to Learn the ABCs of Ransomware

Ransomware has traditionally been a practice where cybercriminals encrypt data and demand ransom in exchange for a decryption key. More recently, a growing number of these bad actors threaten to make this information public if they do not get paid. This shift in the practice of ransomware has increased the "attractiveness" of K-12 schools for cyber criminals. Information about children is among the most highly protected data there is, making it more likely ransoms will be paid to keep it private. For this and other reasons, K-12 schools are seeing an increase in ransomware activity. In 2021, there were at least 62 reported ransomware cases as compared to only 11 in 2018. 2021 also saw ransomware as the most common cyber incident for K-12 schools for the first time ever.

What Gets Compromised in a Ransomware Attack?

An incident in 2020 involving Fairfax County, VA Public Schools resulted in employee social security numbers being posted online. Hackers targeting a school district in Allen, Texas emailed parents with threats to expose their childs' personal information if educators did not pay a ransom. Showing the full swing of ransomware impacts from the serious to the mundane, a 2022 attack on the Griggsville-Perry School District in Indiana had many records compromised and leaked including a detention slip from December 2014 for a student who would not stop interrupting his health class. This shows the breadth of access that hackers had to documents and has led many schools to reexamine their file retention policy to reduce the amount of data accessible to bad actors. Continue reading

Facing the Future of Biometrics

With many of us using our faces to "open" our phones, biometric technology has become an everyday consumer technology. Capitalizing on the comfort and ease of use of facial recognition, government agencies are looking to incorporate it (and other biometric methods) into their modern cybersecurity plans and approaches but are realizing implementation in a government setting raises a host of complications.

Interest in facial recognition is strong

The U.S. Government Accountability Office (GAO) released a report in August of 2021 that detailed current and planned use of facial recognition technology by federal agencies. In a survey of 24 departments and agencies it found that 18 reported using the technology and 10 reported plans to expand their use of it. Continue reading

Zero Trust in Government Accelerates 0-60

Zero Trust is a logical evolution of security in a world where remote access to networks and applications is more common than being on-site with an organization's data center. From cloud applications to the explosion of remote work, the traditional "castle and moat approach" simply does not scale or protect networks that are constantly being accessed by outside users.

The Executive Order on Improving the Nation's Cybersecurity (Cyber EO) has a strong emphasis on moving government toward a Zero Trust approach for security. It laid out deadlines for agencies to submit plans for implementing Zero Trust architectures, holding organizations accountable for changing how they allow users to access their systems. Continue reading

Navigating the Hybrid Government Career Fair Environment for Post Military Careers

As with other networking and professional development events, job fairs are also transitioning back to their in-person form, but not without changes. The beauty of a job fair is the convenience and efficiency for recruiters and job seekers alike - a place to meet possible matches all in one location. When pandemic restrictions moved events online, the convenience grew as people did not need to leave their house, but efficiency gains were not always realized. Just as the workforce is now hybrid, so too is the job seeking environment.

Virtual Job Fairs Mirror Virtual Work

Virtual job fairs are here to stay because of the convenience, time savings, and their ability to facilitate geographically inconvenient meetings. With more companies hiring a hybrid workforce, location is not as important-you could be in Washington, DC interviewing for a job in Austin, TX or vice versa. Many people have found they prefer remote work to in-office positions and those people will also look for virtual opportunities for networking. Continue reading

Are We There Yet? The Future of Modernization

There's no shortage of mandates and guidance related to modernization-PMA, Technology Modernization Fund, FITARA, Cyber EO, CX EO-pushing the government to update how they deliver services online, but what does it really mean, and what is involved?

Modernization in government began with transforming data centers and integrating cloud computing into government IT architectures and moved on to improving customer experience. Agencies have made inroads in all areas. The recent FITARA scorecard showed that data center consolidation goals have been completed. Cloud efforts have moved from Cloud First to Cloud Smart in an effort to ensure cloud was just not a checkbox but was being used to transform how the government consumes and distributes IT services. Citizen Experience (CX) has been a priority across three administrations with the next generation of CX efforts outlined in an executive order. These modernization efforts have resulted in billions of dollars in cost savings and increased efficiency for a government workforce that is now telework friendly, but the work is not done. Continue reading