Layering your K-12 campus safety management and cybersecurity tools provides the most complete coverage School administrators have a heavy burden when it comes to keeping students and faculty safe in today’s education environments. Threats to health and safety come in many forms, including cyber threats as well as physical ones. We mainly deal with K-12 […]
As more colleges and universities transition to the cloud, higher education cloud security can no longer be treated as an elective As they say, “the writing is on the wall” for the eventual transition to cloud computing in higher education. Like many organizations, colleges and universities are moving to the cloud to reduce the costs […]
Learn why schools across the country are using dedicated K-12 cloud application security technology to protect students and staff
Learn How School IT Administrators Protect Students and Staff with K-12 Cloud Security
K-12 cloud security solutions protect students and staff from identity theft, financial risk and personal harm
Remember the excitement of heading back to school? Spending hours organizing your pencil box and binder until you got it just right? Fresh notebooks ready to be filled with notes and doodles? For today’s student, the same excitement is there (most of the time hopefully), but the tools have changed.
As cloud apps and CASBs have matured, predicting 2018 industry events is much easier than in the past. You don’t need to be a psychic to know that there will be at least one CASB vendor acquired by a big security company. Of course, there will be nuances and details that are hard to pin down, but for the most part, the road ahead is getting clearer. Acquisitions, product changes, and our day to day work provide hints at what’s coming next.
As we roll into 2018, we expect 2017 will be remembered with mixed emotions. Instead of debating its merits and drawbacks, most will agree that 2017 was a time of rapid change, especially for cloud security technology. Stories about digital security are mainstream news. And we are proud to say that the Cloud Access Security Broker (CASB) industry has also become mainstream, to the point that consolidations have shrunk the standalone space, and CASBs play an important role in most major security stacks.
Higher education institutions are major targets for hackers. Their databases contain a perfect trifecta of personal information, financial and health data for what’s considered high-value targets on the black market. Last year, a hacker known as Rasputin breached over 60 universities and government agencies and the tally continued to grow into 2017, becoming one of the largest higher education breaches in history.
Lately, it’s become popular to say that CASB tools use Machine Learning (ML) to detect anomalies in cloud apps. However, you have to be cautious about these claims. What is not widely known is that building a machine learning model is the easy part; training the model is the hard part, requiring enormous amounts of data.
In the past, security technologies were black boxes that you placed in your data center. For the most part, customers didn’t look inside the security technology. Those black boxes worked well in a defined perimeter. Things started changing with virtualization. You can now get a powerful security VM stood up in minutes.
Email is almost too easy. We barely give it a second thought before hitting send or clicking open. According to a 2014 study published by the Radicati Group, people check their email an average of 74 times a day to receive about 88 emails and send about 34 emails, and that was 3 years ago! If we spent a lot of time thinking about every single email we receive and send, we’d spend our entire workday in our inboxes.
We’re excited to announce that UK companies can now have visibility and control of their cloud applications thanks to our first reseller partners in the UK: Prevention Software and Cyber Secure. These partners are now offering our CASB product, Cloud Access Monitor.
Schools need accessible data and networks for a diverse audience of users, including students, parents, teachers, administrators, and third-party vendors. And on the surface, it seems that the cloud is making meeting everyone’s needs much easier. Yet the transition to cloud-based computing was oversold as a much less expensive way to manage IT, but the truth is that you still have to manage your school’s IT services and cybersecurity even when they are in the cloud. It’s a delicate balancing act.
I used Google Docs to write this post – the popular word processing app within Google G Suite. At ManagedMethods, Docs is an indispensable part of our workflow. Collaborating, sharing and editing documents with a team through the cloud is easier than ever, leaving many of Microsoft’s Office apps in the dust.
IT has moved out of the enterprise data center and into the cloud. Employees work from anywhere and access business data using personal devices such as tablets, phones, and laptops as BYOD is becoming more widely adopted. While the technology to support this new way to work has evolved, security protocols haven’t kept up and legacy network security vendors are scrambling to find an answer to this increasing trend.
OAuth is a very good security standard that has been carefully designed to balance user experience and security and is a solid security protocol that has been used across many apps. OAuth is a standard many SaaS vendors support for REST API access. When something is as popular as OAuth, it quickly becomes an attractive target for hackers and bad guys, like with yesterday’s Google Docs attack.
A recent New York Times article about Uber shared some damaging revelations about the company’s CEO, Travis Kalanick, and how Uber leveraged data from an app called Unroll.me
Last week, Ars Technica broke news about an information leak in Docs.com, Microsoft’s version of Google G Suite. Users unwittingly shared sensitive docs publicly that contained private data easily accessible from search engines. Microsoft is taking corrective action, but for those who’ve had their Social Security and health information hijacked, these actions are of little consolation.