In this compelling episode, we welcome Dr. Katrise Perera to discuss a critical factor in student success: the quality of teachers hired. Dr. Perera shares her belief that the effectiveness of education relies heavily on the dedication and skill of educators.
Read MoreJoin us for an inspiring episode where we interview Dr. Brenda Poole, Superintendent of Brinkley School District. Dr. Poole shares her insights on fostering achievement and ensuring every student’s success daily.
Read MoreJoin Co-CEO and Co-Founder Dave Darmstandler as he sits down with Dr. Sam Romeo and Dr. Chris Hawley from Seity Health. Discover the remarkable journey of this dynamic duo as they unveil a groundbreaking tool designed to save lives in just 10 seconds a day. Tune in as they share their insights, innovations, and the inspiring story behind their life-saving creation.
Read MoreIt’s never too late to identify considerations when embarking on a budget or future forecast surrounding technology infrastructure within a school district. Whether you’re a CBO, CTO, a treasurer—or anybody handling public funds—you should always be aware of these three tools of planning.
Read MoreFinding dollars for cybersecurity in K12 school districts can be a tricky business. Often new programs fly under the radar. This episode gives some general direction on what programs schools can utilize to capture funds for cybersecurity purposes.
Read MoreCyberattacks happen every day, but the sophistication of some of the most recent data breaches teaches us several lessons about safeguarding sensitive data. Cyberterrorism happens swiftly and oftentimes unnoticed—even to companies like Yahoo and Zoom.
Read MoreMichael Schilber joins the podcast to share insights on empowering digital safety for yourself and your organization
Read MoreAh, October. This month is known for Halloween, the Fall colors, and, for some of us, Cyber Security Awareness Month. You have probably been exposed to countless articles and ads which are important in aiding in awareness.
Read MoreAutomation is a great tool for improving response time to cyber security events. In this episode our resident automation expert Marshall Rownd shares his thoughts and the tools he uses at Datapath.
Read MoreIf you work in a school district, you probably have a good understanding of what cloud services can offer. You also have likely seen what traditional infrastructure looks likes, sounds like (those noisy server rooms), and the experience of when it is not working.
Read MoreEndpoint Detection and Response (EDR) is a security system that helps protect individual devices, such as computers and laptops, from malicious activity. It is an evolved form of the traditional Endpoint Protection Platform (EPP), which detects malicious behavior before it can do harm.
Read MoreTightening the security of your system can feel like a daunting task. Maybe you're worried you don't have the resources or budget to do it yourself. Or maybe you don't know where to start from because of all of the different things that need your attention – firewalls, VPNs, encryption, proxies and even more acronyms.
Read MoreIt's often tempting to throw an old electronic device in the trash or give it away, but this can be dangerous for both yourself and the environment. The best way to dispose of your electronics is by giving them to a professional company who knows how to properly destroy data and safely recycle parts.
Read MoreWhether you are a superintendent, CBO, IT Director, or other IT decision maker, we can help with some alternative ways to approach the supply chain shortage. Read on for alternative solutions that may help.
Read MoreIn March of 2020, which seems so long ago and just yesterday at the same time, a lot of people who were accustomed to working in an office went to work from home, just for a couple of weeks, to slow the spread of a global pandemic.
Read MoreDue to outstanding demand, the FCC just announced that they will open a third Emergency Connectivity Fund application filing window! This is great news for schools that need connectivity equipment and/or services.
Read MoreUkraine and Russia have been in an active conflict over a disputed border since at least 2014, and this has recently escalated into a full scale military invasion of Ukraine in which Russian leaders have stated that their objective is to replace the Ukrainian government and prevent any notions of a western alliance from materializing.
Read MoreIn the movie Ferris Bueller’s Day Off, valet parking attendants famously ‘borrow’ a vintage Ferrari. Cryptojackers want to do the same thing to your computer.
Read MoreThe vulnerability was found in the Log4j module which is a utility for creating log data that was written in the Java language. This vulnerability potentially allows hackers to trick the module, which is intended to write benign log files, into executing lines of code.
Read More