The Challenge
Like most school districts the main challenge is a lack of time; too much to do with not enough resources. At Lake Dallas ISD an IT Department of six has responsibility for 650 staff members, 4000 students, 5000 Chromebooks, and 1500 windows devices.
Mike Dabney, the Director of Technology at Dallas ISD shared his thoughts on the day to day stress of the job, “with so much to manage 24/7, we are constantly in fire-fighting mode. The risk of cyberthreats has never been higher, and we must contend with the threats from both inside and outside of the district network. Being a previous victim of a ransomware attack, we know all too well that the external threat from bad actors is very real, but as vigilant as we are, lack of time is our biggest concern”.
The Solution
Following a ransomware attack last spring, Lake Dallas ISD began using an EDR solution recommended by the vendor tasked with helping with the remediation. In the months following, Mike decided to look into other solutions to help mitigate the risk of further attacks. Lake Dallas ISD was introduced to BlackFog while evaluating a few other EDR solutions.
Lake Dallas ISD made the decision to deploy BlackFog to select devices to evaluate the solution. “We were so busy it was hard to find the time to evaluate multiple solutions, but the concept of anti data exfiltration technology was interesting, so we decided to give BlackFog a try.”
The Approach
“BlackFog’s Enterprise console was straightforward and intuitive. We didn’t need to read any manuals to be comfortable with the product. It worked well alongside the EDR solutions which was also a big plus. During the trial we deployed BlackFog across some of the student lab computers and all of our servers and we found that BlackFog was reporting on different things. Whereas EDR was looking at what was coming into the network, BlackFog was watching the back door, which was an interesting approach”, commented Mike.
The Results
During the trial Mike and his team became comfortable with the solution and deployed it on additional systems. Until school started Mike and his team didn’t see a lot of interesting activity in the console, so they felt they needed more time to use the product. Mike commented, “we decided to purchase some additional licenses and we are really glad to have it”.
“BlackFog reports in a different way, and from a different angle to other solutions, so we are seeing things we don’t usually get to see. I’m in the console every day and it’s not a chore to manage, but the biggest plus is that it’s doing something specific and unique. I particularly like the Threat Hunting feature where I can drill into specific events for more details; it can help you discern if it’s a false positive or not or dig deeper. The hourly impact report is also interesting. If I see activity in the middle of the night, I want to know what that is”.
When asked if he would recommend the solution to other school districts, Mike commented, “Absolutely. The BlackFog solution has proven to be a great resource in helping protect our data, and I am grateful to have this resource at our disposal. BlackFog will manage it for you, 24/7, providing another resource to help ensure your data doesn’t end up in the hands of cybercriminals. I’d recommend any organization do what they can to mitigate cybersecurity risks, as the fallout is always worse than you expect. Prevention really is key.”
Share This Story, Choose Your Platform!
Related Posts
Infostealers Explained: The Hidden Gateway to Ransomware
Infostealers compromise credentials and open the door to ransomware. Learn what they are, how they work, and key steps to keep your business safe.
Data Poisoning Attacks: How Hackers Target AI-Driven Business Systems
Data poisoning corrupts the information resources that AI systems rely on. Learn how this growing threat works, why it matters and what steps your business can take to defend against it.
What is Cyber Resiliency and Why Does it Matter in 2025?
Discover why cyber resiliency is vital in 2025 as firms face complex threats. Learn how businesses can adapt, recover and protect trust.
The Interlock Ransomware Problem Security Teams Can’t Ignore
Interlock ransomware is disrupting healthcare, cities, and infrastructure in 2025 with fake update lures, data theft, and double extortion tactics.
Effective Data Security Management: Strategies and Best Practices
What must firms do to develop an effective data security management strategy? Here are some key best practices to follow.
What is Data Loss Prevention? | A Complete Guide to DLP Security
Learn everything you need to know about what data loss prevention is and how to implement it in this comprehensive guide.