Cybersecurity in the School System

September 19, 2022 00:23:30
Cybersecurity in the School System
Chief of Cybersecurity
Cybersecurity in the School System

Sep 19 2022 | 00:23:30

/

Hosted By

Dewayne Hart

Show Notes

The shift to remote education and online learning has prompted many schools to increase their digital protection. Before COV19, online education entities and K-12 learned through classroom instructions. Since the change, many K-12 students are learning from home, and college students' enrollment has increased.

Both come at a cybersecurity cost, but there is a need for remote learning. How safe are our educational systems? Well, this podcast will dissect some of the events and issues that cause concerns; and highlight protection standards. Our youths should feel safe!

View Full Transcript

Episode Transcript

WEBVTT 1 00:00:03.799 --> 00:00:07.679 Alright, alright, we're back in Atlanta at the global podcast studios, uh, 2 00:00:07.679 --> 00:00:09.560 and we've got a great show here for you. Today. We're talking 3 00:00:09.599 --> 00:00:15.080 all things cybersecurity, but today's topic is very timely. It's not just security 4 00:00:15.160 --> 00:00:19.160 in the school system, but it's Cybersecurity, and we're all we've all heard 5 00:00:19.160 --> 00:00:24.120 the headlines about cybersecurity attacks and businesses and in the retail specter. But we're 6 00:00:24.160 --> 00:00:28.320 gonna talk about Um Education Systems and we have the expert, the Guru, 7 00:00:28.440 --> 00:00:32.119 the man, the dude, the doeskis man of Cybersecurity, live in our 8 00:00:32.119 --> 00:00:35.399 studio. Dwayne, Mr Dwayne Harart, welcome to the show. I'm trying 9 00:00:35.399 --> 00:00:39.320 to stop laughing. I just saw you. It's gonna be video. Yeah, 10 00:00:39.600 --> 00:00:41.920 you can pull you can. You can make that happen with a podcast. 11 00:00:42.000 --> 00:00:45.719 Yeah, speaking of videos. So, Um, you've been Um, 12 00:00:45.799 --> 00:00:49.280 you've been doing all things in terms of your book. Is Is, you 13 00:00:49.320 --> 00:00:52.960 know, on the rise and it's gotten lots of sales in that category. 14 00:00:53.359 --> 00:00:57.359 Your Youtube channel has always been, Um, very prominent, but you've started 15 00:00:57.399 --> 00:01:00.119 doing live stream on youtube now. Right. How's that been going for you? 16 00:01:00.079 --> 00:01:03.719 I want to be a TV star, so you're working your way there. 17 00:01:04.519 --> 00:01:11.359 So these live screens are going well because they're designed to focus on happing 18 00:01:11.400 --> 00:01:15.879 people channel their careers and in the sober security market. You know much of 19 00:01:17.000 --> 00:01:21.959 the conversations that we have about some of these solutions and some of the challenges 20 00:01:22.000 --> 00:01:26.879 and issues and sober security with the technologies. You and I take care of 21 00:01:26.879 --> 00:01:32.920 those through the podcasts. You you know U Cybecurity, Gurule. Yeah, 22 00:01:33.040 --> 00:01:34.959 I'M gonna write the chapter in your book. I can't write a whole book 23 00:01:34.959 --> 00:01:38.719 about it, but yeah, all write from the from the user experience. 24 00:01:38.799 --> 00:01:42.760 And Yeah, yeah, yeah, I got a name for that. All 25 00:01:42.840 --> 00:01:48.519 right, I got his serious name for that. Yop Dusty, dusty hackles 26 00:01:48.560 --> 00:01:53.799 hat fit. Oh, I like that. Yeah, because there's adjestable hat 27 00:01:53.840 --> 00:01:57.159 size. Get a customer one. Um, you got my wheel spending. 28 00:01:57.200 --> 00:02:00.159 But we gotta stay focused here. Yeah, so we got limited out of 29 00:02:00.200 --> 00:02:02.040 time. Let's talk about as I mentioned at the top of the show, 30 00:02:02.439 --> 00:02:07.239 this is about cybersecurity and, Um, the hackers, as you mentioned, 31 00:02:07.319 --> 00:02:12.319 in the school system. So, UM, talk to us about Um, 32 00:02:12.360 --> 00:02:15.919 you know in the last couple of years what's been on the shortlist. Well, 33 00:02:15.879 --> 00:02:21.919 so let's look at it from the high level. What does colleges offer 34 00:02:22.680 --> 00:02:30.680 to the community education. How is education now taking advantage of? It's through 35 00:02:30.719 --> 00:02:38.439 online assets, it's through sitting at home with your computers, because now we're 36 00:02:38.520 --> 00:02:44.960 in this age where we're in post covid and most colleges, and a lot 37 00:02:44.960 --> 00:02:52.400 of colleges really Um, transition to more online, Um, how can I 38 00:02:52.479 --> 00:02:59.479 say online type of services offered, and now what happens is that they're seeing 39 00:02:59.520 --> 00:03:02.439 that believe with these online services we can attract more students, you know, 40 00:03:02.520 --> 00:03:07.439 because everybody wants to go to school from home. So, with that said, 41 00:03:07.520 --> 00:03:14.280 underneath all of the all of the changes are is a serious, serious, 42 00:03:14.280 --> 00:03:20.159 serious situation, and it's called cybersecurity. And, you know, I 43 00:03:20.599 --> 00:03:25.759 just want to say that it's a serious concern because because we're dealing with information 44 00:03:25.960 --> 00:03:30.280 and we're dealing with data and we're dealing with someone that is located in a 45 00:03:30.360 --> 00:03:37.520 remote location and logging onto a server that is probably located five hundred miles away, 46 00:03:37.759 --> 00:03:40.039 and in between that, we don't know who is, you know, 47 00:03:40.240 --> 00:03:46.639 standing there or sitting somewhere with the laptop trying to intercept, ready to attack. 48 00:03:46.960 --> 00:03:52.120 Yes, Um, so you mentioned, uh, stats and some numbers. 49 00:03:52.199 --> 00:03:53.759 Let me give you some stats from a recent article here, such uh, 50 00:03:53.800 --> 00:03:58.159 since the onset of the covid nineteen pandemic, both schools have returned to 51 00:03:58.199 --> 00:04:01.879 a fully integrated Um in person learning environment, but for a lot of the 52 00:04:01.960 --> 00:04:06.319 damaging effects from those last couple of years, while we were all kind of, 53 00:04:08.199 --> 00:04:12.199 you know, being sent home and so forth. Um. Sixties seven, 54 00:04:12.240 --> 00:04:16.480 according to this article, sixties seven separate ransom attacks impacted almost a thousand 55 00:04:16.920 --> 00:04:21.160 schools and colleges, putting at risk personal data of almost a million students. 56 00:04:23.199 --> 00:04:28.519 Um. That's pretty some scary statistics, right, it is scary, it 57 00:04:28.560 --> 00:04:33.480 is is facts, facts, but but you know, what I would like 58 00:04:33.519 --> 00:04:42.800 to say is that that one of my talking points for Cybersecurity is that let's 59 00:04:42.839 --> 00:04:46.439 just for a minute, move away the type of organization or agency that, 60 00:04:47.639 --> 00:04:50.240 you know, we are dealing with. Let's just say if it's not a 61 00:04:50.319 --> 00:04:55.839 school, and let's just look at Cyber Cybersecurity, you know, for what 62 00:04:56.000 --> 00:05:00.199 cybersecurity is all about. Let's just look at cybersecurity only. And if we 63 00:05:00.279 --> 00:05:02.600 do that, there are certain standards that need to be followed. But you 64 00:05:02.639 --> 00:05:08.439 have to but you have to institute those standards across the different platforms. You 65 00:05:08.480 --> 00:05:15.759 know, those different platforms, platforms are colleges, banks, hospitals, Um, 66 00:05:15.759 --> 00:05:20.120 maybe, maybe, maybe, your maybe, your utility plans. All 67 00:05:20.199 --> 00:05:26.560 Right, so the foundation to cybersecurity should always be in place, but how 68 00:05:26.639 --> 00:05:30.160 you use them, based on the technology that you have in place at these 69 00:05:30.160 --> 00:05:34.600 different platforms, makes it different. Somewhere you fail or you succeed. Now, 70 00:05:34.959 --> 00:05:41.319 now with colleges, see it's unique because you have a training environment and 71 00:05:41.399 --> 00:05:46.040 you have portals and you have online assets, and not all the students that 72 00:05:46.079 --> 00:05:53.519 are going through these program are working in technology. Maybe only probably, I 73 00:05:53.519 --> 00:05:59.120 would say if about ten to fifteen. Pretend of the students are studying technology, 74 00:05:59.480 --> 00:06:02.800 so that other students are either studying business or some type of liberal arts 75 00:06:02.839 --> 00:06:09.879 and Liberal Arts and Um, social and Um, you know, the basic 76 00:06:09.959 --> 00:06:14.519 mass reading and so forth, but the technology space. Right. So they're 77 00:06:14.519 --> 00:06:18.160 not in the technology space. So what? So what has to happen is 78 00:06:18.199 --> 00:06:23.879 that that I always state this, is that the cybersecuity mindset works in the 79 00:06:24.199 --> 00:06:30.519 millions of domains and what individual will have to do is to learn that the 80 00:06:30.639 --> 00:06:38.680 standard to making cybersecurity operate is to invoke a thinking process and and see that 81 00:06:38.720 --> 00:06:43.319 thinking process is saying that, hey, we are in a school system, 82 00:06:43.519 --> 00:06:46.600 but their standards. We need to follow like everybody else follow, because what 83 00:06:46.680 --> 00:06:53.040 I hate the most about the cybersecurity industry is that there's there's always a conversation 84 00:06:53.160 --> 00:07:00.279 about which industry has hit the most. All industries are to set the and 85 00:07:00.279 --> 00:07:04.639 and the most important industry is your industry, whenever you're in so no offense. 86 00:07:04.680 --> 00:07:09.079 But like if another industry, the retail sector, and if you're not 87 00:07:09.120 --> 00:07:12.560 in that space, it doesn't concern you. But if you're in the school 88 00:07:12.600 --> 00:07:15.720 system and you're responsible for kids, whether they're, you know, middle school, 89 00:07:15.800 --> 00:07:19.160 because now computers are being issued to, you know, elementary schools, 90 00:07:19.199 --> 00:07:21.839 we just think, not just high schools. Right, let me ask you 91 00:07:21.879 --> 00:07:26.279 this question. Who Do you think is more susceptible, uh, in terms 92 00:07:26.279 --> 00:07:30.040 of UH, cybersecurity in within the school system? The High School or the 93 00:07:30.079 --> 00:07:32.839 College? I'll give him my viewpoint on see if you subscribe to it or 94 00:07:32.879 --> 00:07:36.920 not. Right. So, I think potentially you could, you know, 95 00:07:38.040 --> 00:07:41.079 argue both sides of this. But but on one hand, the college, 96 00:07:41.319 --> 00:07:45.399 because they're more independent, there's no parents overlooking and they're more likely to kind 97 00:07:45.399 --> 00:07:50.480 of use their their school quote computer for other applications besides what, besides homework, 98 00:07:50.519 --> 00:07:54.399 where they should be using it for. Right so they're more and and 99 00:07:54.439 --> 00:07:57.720 again they're in a different mindset. They're not as mature now the high school 100 00:07:57.800 --> 00:08:01.240 kids, in theory their parents. If they're, you know, we'll talk 101 00:08:01.279 --> 00:08:05.600 about this later, if they're instructed by the school system, the dudes and 102 00:08:05.639 --> 00:08:09.240 don't to the computer, they're being potentially more monitored. Right. So which 103 00:08:09.439 --> 00:08:13.720 is safer or which is which one do you subscribe to when? But I 104 00:08:13.759 --> 00:08:18.920 have two different things talk about. One is digital parenting, digital parents, 105 00:08:20.000 --> 00:08:24.680 and focused on the younger group of students. The second thing that I like 106 00:08:24.759 --> 00:08:31.439 to focus on is that WHO has assets to the most data? Okay, 107 00:08:31.560 --> 00:08:33.919 that's a good point. Okay. So so when we look at this scenario, 108 00:08:35.799 --> 00:08:39.200 the youth don't have assets too much data as the college students do, 109 00:08:39.600 --> 00:08:43.000 because college students have asked this to a lot of data, and it's personal 110 00:08:43.080 --> 00:08:48.679 data. For the colleges Um you know, they have to put their social 111 00:08:48.679 --> 00:08:54.799 security numbers online and a couple of informational things have to be shared and you're 112 00:08:54.840 --> 00:08:58.639 dealing with other people email addresses. You know, it's a couple of things 113 00:08:58.679 --> 00:09:03.480 that call and to that area of data or protection. But college students have 114 00:09:03.960 --> 00:09:07.000 as ss the more data and you know, the more assets, you have 115 00:09:07.159 --> 00:09:13.720 to data and that's the more need of cybersecurity. That that I subscribed to. 116 00:09:13.759 --> 00:09:16.639 That that makes sense, um. So what do you think? Figure 117 00:09:16.679 --> 00:09:22.799 has changed, uh, in the last couple of years related to you know, 118 00:09:22.840 --> 00:09:28.240 it used to be all homeworkers done with a book and not much technology 119 00:09:28.320 --> 00:09:31.360 was involved. The only technology was more the record keeping of the school system, 120 00:09:31.480 --> 00:09:37.559 right, but now that we're opening the floodgates to everybody giving access to 121 00:09:37.639 --> 00:09:43.200 that Um, where are some potential, you know, challenges and order some 122 00:09:43.879 --> 00:09:48.799 solutions to that Um? I'm pretty much like a look at it from three 123 00:09:48.879 --> 00:09:54.320 levels. You know. The first level is that we have remote assets. 124 00:09:54.879 --> 00:10:03.360 Okay, most people now are using on line Um Portals to gain information to 125 00:10:03.440 --> 00:10:07.840 the college classes or whatever. Right. So you think about the number of 126 00:10:07.840 --> 00:10:13.240 people that use remote assets. Fifty years ago, everybody was in the classroom, 127 00:10:13.480 --> 00:10:20.039 right, okay. So when it comes to data, people now do 128 00:10:20.240 --> 00:10:24.480 not go into the closet and pull that shoebox out right and see what they 129 00:10:24.480 --> 00:10:28.720 were in down on the sheet of paper. All that information is saved on 130 00:10:28.759 --> 00:10:35.120 a service somewhere and these colleges are saving information even from nine, maybe ten 131 00:10:35.200 --> 00:10:37.519 years ago, when someone used to go to the College of pret much. 132 00:10:37.919 --> 00:10:43.279 You know, was was a student there. That information is still saved in 133 00:10:43.360 --> 00:10:50.399 every politory exactly. So when when it was a paper trail, I mean, 134 00:10:50.799 --> 00:10:54.720 you know, it's a paper trail and it was locked up somewhere. 135 00:10:54.799 --> 00:10:58.240 Now that third level Um that, I think, had changed over time. 136 00:11:00.240 --> 00:11:05.279 It is that is that we are in an age now where where people feel 137 00:11:05.360 --> 00:11:13.320 more comfortable working from home and working remotely. So their mindset has shifted from 138 00:11:13.440 --> 00:11:16.399 the presence of the office to the presence of being at home. And the 139 00:11:16.519 --> 00:11:20.960 midst of all of this we always like to say, okay, what type 140 00:11:20.000 --> 00:11:24.840 of mindset needs to be in place, because you're not in the office anymore. 141 00:11:24.639 --> 00:11:31.399 You know, you can't take your laptop and open up the window unless 142 00:11:31.399 --> 00:11:35.320 you're on a PC using windows. Yeah, you can't do that right. 143 00:11:35.200 --> 00:11:41.039 Um. So, in terms of uh, you know, cyber attacks, 144 00:11:41.440 --> 00:11:48.159 ransom now in the article they mentioned that there were Um rentsomware attacks, but 145 00:11:48.200 --> 00:11:52.279 I don't know. We've heard some stats about businesses being, you know, 146 00:11:52.399 --> 00:11:56.879 held hostage with are right, but is there any indications that school systems have 147 00:11:56.960 --> 00:12:03.120 been susceptible to that as well? Know what I would say yes, because 148 00:12:03.639 --> 00:12:09.919 I would never ever try to downplay or short change cyber security. Right, 149 00:12:11.159 --> 00:12:16.039 ransomware, it can happen anywhere. And if you think about college students, 150 00:12:16.960 --> 00:12:20.639 and let's just, let's just, let's just look at the mindset of a 151 00:12:20.679 --> 00:12:24.000 college students. I need to do my homework. Good luck on that one. 152 00:12:24.159 --> 00:12:28.759 Okay, I need to do my homework. And they log onto that 153 00:12:28.799 --> 00:12:33.840 computer and they realized that there's a ransomware attack, but they have to give 154 00:12:33.919 --> 00:12:41.080 up, okay, because they can't get to the portal. So if they 155 00:12:41.159 --> 00:12:43.240 buy into that and give up the twenty five dollars, then they can get 156 00:12:43.240 --> 00:12:48.799 their class work done. Now that opens Bandora's box. Next time it's fifty 157 00:12:48.200 --> 00:12:52.639 right. Yes, yes, it's fifty right, but you would think about 158 00:12:52.639 --> 00:12:56.799 the number of students that are pretty much under that system. You know, 159 00:12:56.840 --> 00:13:03.360 it can be very, very smaller thing. As to arounsomwhere goes to a 160 00:13:03.440 --> 00:13:07.679 college and locks down its servers, whole university, Whole University, and you 161 00:13:07.720 --> 00:13:15.080 have ten thousand students there that cannot obtain information for their classes and students. 162 00:13:15.200 --> 00:13:18.039 Okay, well, since I can't start the class, then you know, 163 00:13:18.039 --> 00:13:20.320 I want my money back. Okay, because they don't spend them money. 164 00:13:20.480 --> 00:13:24.480 You know, to start the class and the illness was on the university to 165 00:13:24.679 --> 00:13:28.759 Uh to protect. Right, yeah, yeah, and and uh, we 166 00:13:28.840 --> 00:13:31.279 think about, you know, access to the data, but as simple as 167 00:13:31.320 --> 00:13:35.519 their email, because most college kids are issued a email tied to the university. 168 00:13:35.639 --> 00:13:39.720 Yes, right, and Um, so, I mean are there like, 169 00:13:41.159 --> 00:13:46.919 you know, recommendations putting contingency Um options in play? So you should 170 00:13:46.960 --> 00:13:50.679 have redundant uh servers with all that same data, but not not, not 171 00:13:50.840 --> 00:13:54.960 tied together and Um, you know, on a daily basis. Whatever do 172 00:13:56.039 --> 00:14:00.480 they kind of you know, uh clone that to another Erver? I mean, 173 00:14:00.480 --> 00:14:05.399 what are some real world applications to kind of UH get one step ahead 174 00:14:05.399 --> 00:14:09.639 of the hackers? Okay, I'm gonna bring up a term. It's called 175 00:14:09.720 --> 00:14:18.279 PTCA policy. Training and continuous monitor policy means that the college has a policy 176 00:14:18.320 --> 00:14:22.799 out that's that's strong, that states how is you're going to treat the university 177 00:14:24.039 --> 00:14:31.720 systems. All right, twoars. You have to train people on those particular 178 00:14:31.759 --> 00:14:37.360 standards. Um Me honestly. Three ISS you have to have a continuous monitoring 179 00:14:37.399 --> 00:14:41.320 programming place where you have eyes and ears constantly ongoing and watching what is really 180 00:14:41.360 --> 00:14:46.840 going on, because I don't know if a lot of colleges have a security 181 00:14:46.840 --> 00:14:52.159 operational center that that like, monitors the online portals. Most of these security 182 00:14:52.159 --> 00:15:01.639 operational centers are pretty much concerned about trying to manage the internal systems that the 183 00:15:01.679 --> 00:15:07.440 college on or like all the professors use and the D M uses, you 184 00:15:07.440 --> 00:15:11.360 know, for the professional use, not the student news. So the question 185 00:15:11.399 --> 00:15:16.799 goes, is that all these colleges really monitoring the students, because if you 186 00:15:16.840 --> 00:15:24.320 think about a major college that actually has ten thousand students that are remote, 187 00:15:26.159 --> 00:15:31.039 all right, yeah, okay, and you have ten thousand possible different scenarios, 188 00:15:31.120 --> 00:15:35.120 right. So so you have to really think about the way that you 189 00:15:35.200 --> 00:15:39.519 protect their data. And you know, part of it is that most colleges 190 00:15:39.639 --> 00:15:46.480 are probably using a VPN tunnel so that their students can log on. Um, 191 00:15:46.519 --> 00:15:48.399 you know, that's that's kind of the way I think it. I 192 00:15:48.480 --> 00:15:54.159 think it may work, but it still goes back to PTC. PTC will 193 00:15:54.240 --> 00:16:00.320 save you. Okay, policy training and your continuous monitoring and your teams. 194 00:16:00.399 --> 00:16:03.480 Marninton is is kind of going into the question that you pose. Is that 195 00:16:03.720 --> 00:16:08.200 what type of software, applications and all the technologies that you have in place 196 00:16:10.360 --> 00:16:14.960 and making sure that they are operating. Yeah, you could kind of encapsulate 197 00:16:15.000 --> 00:16:17.600 that. What's your protocol? Right, you have to have a playbook, 198 00:16:18.120 --> 00:16:21.960 Um, just like you have a curriculum for your class throughout the year, 199 00:16:22.279 --> 00:16:26.720 you need to have written down in writing a plan. Here's what we're doing 200 00:16:26.720 --> 00:16:29.320 on a daily basis, monthly, quarterly, to kind of check in. 201 00:16:29.759 --> 00:16:33.000 But also, and then the training is to educate, Um, the professors, 202 00:16:33.360 --> 00:16:37.879 the students, the staff and so forth. So much like you've talked 203 00:16:37.879 --> 00:16:41.200 about the military application and in business, everybody should have that. You know 204 00:16:41.360 --> 00:16:47.360 that where that hackers hat have that mindset right throughout. So you know, 205 00:16:47.679 --> 00:16:51.360 you talked about in the last episode about the military and being the first line 206 00:16:51.360 --> 00:16:55.799 of defense. Right, so that should be implemented at the university and the 207 00:16:55.879 --> 00:17:00.000 high school level as well. Right. And resources equals is obersecurity mindset. 208 00:17:00.120 --> 00:17:04.720 Yeah, and security equals equals security in your system. Is Best you can 209 00:17:04.720 --> 00:17:08.480 do. There's no there's no magic pill whatever. Right, but if you're 210 00:17:08.480 --> 00:17:12.319 not taking proactive steps on it and don't have a process in place, just 211 00:17:12.359 --> 00:17:15.359 like in business, you can't just like wing it. Right, wow, 212 00:17:17.519 --> 00:17:22.200 you saw a MICO sobersecurity expert over there. Don't make my head too big 213 00:17:22.240 --> 00:17:26.799 here or whatever. Yeah, but no, it's a fascinating it's a very 214 00:17:26.119 --> 00:17:30.359 uh, it's UH. We were talking about an article before. You know, 215 00:17:30.599 --> 00:17:36.839 UM, every business it's somewhere in their psyche, right, what if? 216 00:17:37.680 --> 00:17:40.240 Right, and you can't, you know, being ostrogen, have your 217 00:17:40.240 --> 00:17:42.119 head in the sand at the same time. You gotta do other stuff. 218 00:17:42.119 --> 00:17:45.480 You've gotta live in the real world, right, but you gotta understand there's 219 00:17:45.519 --> 00:17:51.160 people, hackers living in the hackers world. There you go, hackers world. 220 00:17:51.720 --> 00:17:56.000 What else? The term that is you throughout the military and it states 221 00:17:56.039 --> 00:18:00.480 that that that if you are ready, then you're always ready. Yeah, 222 00:18:00.799 --> 00:18:06.839 okay. That is that proactive mindset. That's proactive defense. That's part of 223 00:18:06.880 --> 00:18:12.440 the human fall waull theory. That is having that thinking process in place where 224 00:18:12.440 --> 00:18:19.119 you constantly engaged into cybersecurity, because cybersecurity is ongoing. So if cybersecurity is 225 00:18:19.400 --> 00:18:26.319 ongoing, then it only makes it smarter if normal people are ongoing as well 226 00:18:26.400 --> 00:18:30.640 too. So so it's really kind of kind of makes it easy, right. 227 00:18:32.440 --> 00:18:34.720 It's kind of like, uh, in business terms, it's like you 228 00:18:34.720 --> 00:18:41.519 don't rely your entire finances, just your C P A or the finance department. 229 00:18:41.160 --> 00:18:45.279 Everybody within the organization should be monitoring. HOW ARE WE SPENDING MONEY? 230 00:18:45.359 --> 00:18:48.680 Right? ARE WE WASTING MONEY? and Um, and a red flag should 231 00:18:48.720 --> 00:18:52.720 appear if the statements aren't driving right. But you don't have to rely on 232 00:18:52.319 --> 00:18:56.519 the annual review of your statement. You know, you should be monitoring just 233 00:18:56.519 --> 00:18:59.920 like your personal bank account. You know, I gotta call. Yesterday I 234 00:19:00.160 --> 00:19:03.680 was doing, uh, some withdrawals and the bank uh called and said, 235 00:19:03.720 --> 00:19:07.839 hey, there's been some suspicious activity and they actually locked down my account until 236 00:19:07.839 --> 00:19:12.559 it was verified by me. Right. So transpose that into our topic today 237 00:19:12.599 --> 00:19:15.680 about cybersecuity in the school system. One last question. We're running out of 238 00:19:15.680 --> 00:19:19.079 time here, but, Um, one last question, kind of on topic, 239 00:19:19.079 --> 00:19:26.400 but a little different angle to this. Um, are you is cybersecurity 240 00:19:26.400 --> 00:19:29.759 being taught, you know, at the college level in terms of, you 241 00:19:29.799 --> 00:19:33.119 know, a career, and has that built into some of the curriculum? 242 00:19:33.200 --> 00:19:37.799 Do you feel, Um, at this point? Well, cybersecurity is taught 243 00:19:37.839 --> 00:19:42.240 as a field, but within you think universities have a designated uh, not 244 00:19:42.359 --> 00:19:47.559 a degree in that space? Right, but Um, is that a course 245 00:19:47.640 --> 00:19:49.680 that people can take cybersecurity one on one kind of thing? Right, you're 246 00:19:49.680 --> 00:19:56.279 talking like a user awareness course. Okay, I believe most colleges do have 247 00:19:56.440 --> 00:20:02.720 it and place and and I think it should be in place prior to any 248 00:20:02.759 --> 00:20:07.279 students Um using any of the college services. You know, a user awareness 249 00:20:07.279 --> 00:20:12.000 core should actually be in places where most organizations make sure the interviewers go through 250 00:20:12.039 --> 00:20:18.119 that one hour training on like user awareness seat and I should be almost like 251 00:20:18.119 --> 00:20:21.559 a test, right, and it Wass some I'm sure some high schools, 252 00:20:21.559 --> 00:20:23.519 middle schools, colleges are probably already doing this. If not, you know, 253 00:20:23.599 --> 00:20:27.519 just the Aha moment would be like, we're not actually even issuing you 254 00:20:27.519 --> 00:20:33.599 your computer or your email address until you've passed this test. Right. So 255 00:20:33.640 --> 00:20:36.400 you can train them, but what are they retaining? Right, they can 256 00:20:36.440 --> 00:20:41.200 sit through an hour, but it's basically it's like your driver's license, right, 257 00:20:41.400 --> 00:20:45.160 you can study for the license, but you don't get handed that license 258 00:20:45.319 --> 00:20:48.880 until you pass the driving test. So well, well, you know what, 259 00:20:49.119 --> 00:20:55.519 when it comes to training and people, people, people will have a 260 00:20:55.599 --> 00:21:02.799 lapse. So that's where the and the raise PTC and they see at the 261 00:21:02.920 --> 00:21:04.880 end, which is your continuous Martine, comes in place. This is where 262 00:21:04.880 --> 00:21:07.359 the eyes and ears are monitoring, you know, the people that have been 263 00:21:07.359 --> 00:21:11.640 trained. Okay, now, now you're trained. Now we trust you, 264 00:21:11.680 --> 00:21:15.079 but you know what, you know, we're still gonna keep our eyes and 265 00:21:15.319 --> 00:21:17.799 ears on you. It's like your famous presidents. At one time trust, 266 00:21:17.880 --> 00:21:21.680 but verified. That's right, right, that's that's right. Zero Trust, 267 00:21:22.720 --> 00:21:29.359 you know, you know, with zero proven guilty until you know, the 268 00:21:29.440 --> 00:21:33.960 traditional ways was to trust, trust, with verified. But as announcing we 269 00:21:33.039 --> 00:21:37.319 moved to a zero trust architect out here means that you don't trust at all. 270 00:21:37.440 --> 00:21:41.559 So, you know, once our organization moves to that level, I 271 00:21:41.599 --> 00:21:45.960 think there'll be a whole lot safe, because with zero trust, Um, 272 00:21:47.000 --> 00:21:51.279 you know, like you have a lot of security zones in place, so 273 00:21:51.319 --> 00:21:56.240 you're really being authenticated and verified at so many levels, whereas, whereas the 274 00:21:56.279 --> 00:22:00.559 traditional method means that once you good assets and it was good to go. 275 00:22:02.160 --> 00:22:06.559 But now with zero trust, no, we still need to do verifile with 276 00:22:06.720 --> 00:22:11.119 checks as you progress, do the system and you use these applications. Speaking 277 00:22:11.160 --> 00:22:15.559 of good to go, we gotta go, all right. Yeah, it's 278 00:22:15.559 --> 00:22:19.000 the end of this this magical hour here. Yeah. So, Duanne, 279 00:22:19.039 --> 00:22:22.960 has been a pleasure once again to have you in our Lanto podcast studios here 280 00:22:22.000 --> 00:22:27.039 on the global podcast studios network and rich castnover here. Just adding my two 281 00:22:27.039 --> 00:22:30.279 cents and my two cents are now I'll put to probably probably a nickel at 282 00:22:30.359 --> 00:22:37.519 this point. Right my educational cybersecurity, you have enough to go out nice. 283 00:22:37.599 --> 00:22:41.640 Well, you definitely have the similar dollar in this on this topic and 284 00:22:41.680 --> 00:22:45.440 subject matter. And speaking of that Um again, check out DWAYNE HART DOT 285 00:22:45.440 --> 00:22:51.400 COM. Everything we've talked about on the PODCAST, his book is available there, 286 00:22:51.839 --> 00:22:55.039 links to his youtube for the live stream, so forth and so on. 287 00:22:55.160 --> 00:22:59.240 So rather than giving all kinds of social media handles and websites and Domaine 288 00:22:59.519 --> 00:23:03.440 dwayne right dot com. You'll check it out. Everything is there and we 289 00:23:03.519 --> 00:23:07.079 look forward to having me back in the studio and your upcoming podcast a series. 290 00:23:07.559 --> 00:23:12.880 Okay, take care and again we'll see you next time right here with 291 00:23:12.960 --> 00:23:15.319 Dwayne and rich. I don't know if that's the name of a show, 292 00:23:15.359 --> 00:23:17.599 but we'll be here.

Other Episodes

Episode 11

November 14, 2023 00:23:48
Episode Cover

Mastering The Cybersecurity Mindset Part 1 - Utilize Readiness Concepts to Operate Programs

Do you know what's on your network? That's a serious question that many cannot answer. When invoking "The Cybersecurity Mindset," the reader can relate...

Listen

Episode

December 14, 2022 00:38:48
Episode Cover

Online Scams Target Veterans and Active Duty Members

Online Scams Target Veterans and Active Duty Members The U.S. has the most robust and powerful military in the world, and though its fighting...

Listen

Episode

September 20, 2021 00:30:47
Episode Cover

Cybersecurity Mindset

This podcast session brings into existence of how having a cybersecurity mindset resolves industry problems by being cyber-focused. It provides a chance for listeners...

Listen