Cybersecurity Knowledge Base
Welcome to the ESCEO's Cybersecurity Knowledge Base! We hope this proves to be an invaluable resource to your organization as you make decisions regarding cybersecurity.
Cyber Attacks
- What are the most commonly exploited vulnerabilities?
- What is the cost of a cyber attack?
- How do I go about reporting a cyber attack?
- How many compromised student records constitute a breach?
- What do criminals want from student records?
- How might my district be impacted by a cyber attack?
What are the most commonly exploited vulnerabilities?
What is the cost of a cyber attack?
How do I go about reporting a cyber attack?
How many compromised student records constitute a breach?
What do criminals want from student records?
How might my district be impacted by a cyber attack?
Cyber Insurance
- How do I figure out how much cyber insurance coverage my organization needs?
- Do you get a discount on cyber insurance for being compliant with NIST, K12 SIX, or CIS Critical Security Controls v8 frameworks?
- Will cyber insurance providers eventually require that MFA is enabled for all Windows accounts?
How do I figure out how much cyber insurance coverage my organization needs?
Do you get a discount on cyber insurance for being compliant with NIST, K12 SIX, or CIS Critical Security Controls v8 frameworks?
Will cyber insurance providers eventually require that MFA is enabled for all Windows accounts?
Cybersecurity Frameworks
General Questions
- What is the ultimate goal of implementing a cybersecurity program?
- What is the most important cybersecurity measure to implement?
- How should we handle the use of personal cell phones in the workplace?
What is the ultimate goal of implementing a cybersecurity program?
What is the most important cybersecurity measure to implement?
How should we handle the use of personal cell phones in the workplace?
Multifactor Authentication (MFA)
- What should I put MFA on?
- Is Windows Hello an acceptable form of MFA for Windows accounts?
- Is Windows Hello as secure as a third party MFA application?
What should I put MFA on?
Is Windows Hello an acceptable form of MFA for Windows accounts?
Is Windows Hello as secure as a third party MFA application?
Policy
Have a question that's not answered in our knowledge base? Let us know by completing the form below.
Required