Blog

5 Best Practices for Emergency Communications Preparedness

An emergency strikes and the power to your facility, building or campus is disrupted, or a human threat endangers personal safety, or a natural disaster puts data security and business operations at risk. In any of these scenarios, and there … Read More ›

School IT Safety: Five Tips for Smarter Physical Security

At Single Path, we spend a lot of time thinking, acting and working on ways to protect computers electronically—backing up data in case of system failure, keeping private information away from hackers, ensuring safe and trouble-free 1:1 learning environments and … Read More ›

The Value of an Emergency Alert System

Emergencies happen, and when they do, the ability to immediately communicate with your team and emergency responders can be critically important. A natural disaster. A weather alert. A gas leak. Or, something darker. Regardless of the problem, having a communication … Read More ›

How to Create Your School Cyber-Threat Strategy

Cyber-threats are on the rise in our school districts, which often lack the resources to protect themselves, the training to use the resources they have effectively, and even the knowledge to identify which resources are needed. We wrote about the … Read More ›

Cyber Incidents for K-12 are Rising. Is Your Student Data Vulnerable?

Data leaks are becoming so commonplace it seems like we’re almost becoming immune to them. Another ransomware attack on a business. Another virus crippling a network. Another identity theft scam. But then something happens that shakes us up and reminds … Read More ›

Is Your Cisco Network Hardware Leaving You Vulnerable?

Recently, Cisco Systems made the news, but not the sort of news any Internet-related business wants to make. Their network hardware was hijacked, and hundreds of thousands of their customers were victims. As this blog post from Kaspersky Labs reported … Read More ›

Owt trap, noitneverp ssol atad fo tra eht dna noitpyrcne (Encryption and the Art of Data Loss Prevention, Part Two)

With cyberthreats on the rise, and hackers becoming more sophisticated, strategies to protect your files are critical—and encryption is a tool too important to ignore. In our last post, we explained the basics and importance of data encryption. Now, we … Read More ›