Category: Security Blog

EDTech Conferences

Every year, there are dozens of educational conferences and expos in the US that bring educators together to discuss best practices, test new tools, and make connections with fellow educators. One look at a calendar of all of the year’s upcoming conferences might just seem like a jumble of strange acronyms. With so many different conferences to choose from, it can be hard to decide which conferences you should attend.

Small School Network Security and Wireless Internet

While a tremendous number of options exist for school security, wireless networking and content filtering, there are very few that seem to be well-suited for a Seventh-day Adventist Small School environment.

KnowBe4 Security Awareness Training

You’ve seen them.  Those email messages from your bank that say they are making changes and ask you to LOGIN to your account using the link provided to verify your details.  Or a message from your principal saying that he needs you to transfer some money ASAP, and preferably in iTunes gift cards! These attempts to steal your personal information or money are known as Phishing.  And along with Smishing, Vishing, and who knows what is coming next, how can you expect to keep your data safe and secure?

World’s Most Valuable Resource

What is RACI and Why Should You Care?

Why should you consider using a RACI chart and approach to important projects or system changes? While is it is important to involve employees from all levels of a company by providing training and involving them in projects one must understand the drawbacks with too much employee involvement.

Identity Masking

Consider using identity masking service, such as Blur  to mask email, caller ID, and credit cards for the best Identity protection.

~Network Paladin

Have You Been Hacked?

Set Email alerts in case your email account gets hacked and shows up on a hacker database.
First, reset your password and then set up 2 Factor Authentication (2FA).



A strong password is a sentence that is at least 12 characters long. Use sentences or phrases that you like to think about (for example, “I love soft cookies.”). On many sites, you can even use spaces!


They Are Watching You

Some stores and other locations look for devices with WiFi or Bluetooth turned on to track your movements while you are within range.