If you don’t have students in a school using PowerSchool, you should still think about the method of attack and how it can be replicated on technology services you use. In this case, a set of third-party credentials were used to access a support portal. There was no multi-factor authentication (MFA) enforced on this support portal, and the support tunnel was wide-open. Two commonly used security measures have now been implemented: MFA is required to use the support portal, and the support tunnel is opened by request only.
Featured
Windows 10 End-of-Support
After October 10, 2025, Microsoft will no longer provide security updates or technical support for Windows 10. This is considered the end-of-support date. Your computer will continue to work, but the lack of security updates will make continued use of your Windows 10 computer a security risk. Read our FAQs to better prepare for and […]
Personal Security Conversations
Consumers were recently warned that a large collection of personal data, including social security numbers, is available for purchase on the dark web. For some, the fear of having your social security number exposed is a fear already faced; multiple healthcare data breaches have already exposed social security numbers for many Americans. For others, the […]
Facebook Recovery Codes
Have you ever received a Facebook Account Recovery Code that you did not initiate? Or maybe you received an email with an account recovery code, but deleted it under the assumption that it was a phishing attempt? I woke up this morning to an unsolicited Facebook Account Recovery Code via email. I checked the links […]
The Quick Read on QR Codes
Quick Response codes, or QR Codes, have been part of our mobile-friendly world since 1994. Typically we see these scannable coded images on advertisements, giving us a quick way to access more information from our mobile device without typing an entire URL or website address on our tiny keyboard. QR codes became even more popular, […]