FortifiED Cybersecurity blog
FortifiED Cybersecurity blog with wall and shield icon
3 Best Practices for Keeping Your Data Safe While Online

3 Best Practices for Keeping Your Data Safe While Online

Current world events are tough right now. And unfortunately, cyber attacks from Europe are on the rise, according to our Federal partners. Here at Round Rock ISD, I want to reassure you that the school District is taking every means necessary to keep you and your data safe. We are monitoring the world situation, along with other districts and agencies. But, we can’t do it alone. We need your help!

FortifiED Cybersecurity blog with wall and shield icon
What kind of potato are you?

What kind of potato are you?

Social media and I have a rose/thorn relationship. It’s a great way to keep in touch with friends and family, but at the same time, social media is a gift-wrapped box of chocolates for hackers. So, while many of us share the bad habit of scrolling with the small phone screen while half-paying attention to the latest episode of 90 Day Fiance or Married At First Sight, would-be attackers are not-so-hard at work.

FortifiED Cybersecurity blog with wall and shield icon
Leveling Up

Leveling Up

Welcome! I’m happy you’re here. My goal is to share some thoughts and ideas in the world of cybersecurity. Each time you choose to visit this blog, I hope you leave it more knowledgeable about the world of cybersecurity.

FortifiED Cybersecurity blog with wall and shield icon
The Cybersecurity Team

The Cybersecurity Team

An organization’s cybersecurity is more of a team sport. Here are two major teams in this field, and we separate them by color: Red and Blue. The Red Team’s philosophy is to protect by attacking first and attacking often and the Blue Team where they need to improve.