
The Challenge
Like most school districts the main challenge is a lack of time; too much to do with not enough resources. At Lake Dallas ISD an IT Department of six has responsibility for 650 staff members, 4000 students, 5000 Chromebooks, and 1500 windows devices.
Mike Dabney, the Director of Technology at Dallas ISD shared his thoughts on the day to day stress of the job, “with so much to manage 24/7, we are constantly in fire-fighting mode. The risk of cyberthreats has never been higher, and we must contend with the threats from both inside and outside of the district network. Being a previous victim of a ransomware attack, we know all too well that the external threat from bad actors is very real, but as vigilant as we are, lack of time is our biggest concern”.
The Solution
Following a ransomware attack last spring, Lake Dallas ISD began using an EDR solution recommended by the vendor tasked with helping with the remediation. In the months following, Mike decided to look into other solutions to help mitigate the risk of further attacks. Lake Dallas ISD was introduced to BlackFog while evaluating a few other EDR solutions.
Lake Dallas ISD made the decision to deploy BlackFog to select devices to evaluate the solution. “We were so busy it was hard to find the time to evaluate multiple solutions, but the concept of anti data exfiltration technology was interesting, so we decided to give BlackFog a try.”
The Approach
“BlackFog’s Enterprise console was straightforward and intuitive. We didn’t need to read any manuals to be comfortable with the product. It worked well alongside the EDR solutions which was also a big plus. During the trial we deployed BlackFog across some of the student lab computers and all of our servers and we found that BlackFog was reporting on different things. Whereas EDR was looking at what was coming into the network, BlackFog was watching the back door, which was an interesting approach”, commented Mike.
The Results
During the trial Mike and his team became comfortable with the solution and deployed it on additional systems. Until school started Mike and his team didn’t see a lot of interesting activity in the console, so they felt they needed more time to use the product. Mike commented, “we decided to purchase some additional licenses and we are really glad to have it”.
“BlackFog reports in a different way, and from a different angle to other solutions, so we are seeing things we don’t usually get to see. I’m in the console every day and it’s not a chore to manage, but the biggest plus is that it’s doing something specific and unique. I particularly like the Threat Hunting feature where I can drill into specific events for more details; it can help you discern if it’s a false positive or not or dig deeper. The hourly impact report is also interesting. If I see activity in the middle of the night, I want to know what that is”.
When asked if he would recommend the solution to other school districts, Mike commented, “Absolutely. The BlackFog solution has proven to be a great resource in helping protect our data, and I am grateful to have this resource at our disposal. BlackFog will manage it for you, 24/7, providing another resource to help ensure your data doesn’t end up in the hands of cybercriminals. I’d recommend any organization do what they can to mitigate cybersecurity risks, as the fallout is always worse than you expect. Prevention really is key.”
Share This Story, Choose Your Platform!
Related Posts
The State of Ransomware: March 2026
BlackFog's state of ransomware March 2026 measures publicly disclosed and non-disclosed attacks globally.
Venom Stealer Turns ClickFix Into a Full Exfiltration Pipeline
BlackFog analyzes Venom Stealer, a new MaaS infostealer that uses ClickFix delivery to launch an automated exfiltration pipeline covering credential theft, wallet cracking, and fund sweeping.
What Enterprises Need To Know About Cyber Governance, Risk And Compliance
Learn all about cyber governance, risk and compliance in 2026 and why this must be a consideration at the highest levels of all organizations.
Navigating Essential Cybersecurity Compliance Standards: What To Know
There are a range of cybersecurity compliance standards firms of all sizes must deal with, including mandatory and voluntary frameworks. Here's what you need to know.
Understanding The Requirements Of Information Security Compliance
Learn precisely what information security compliance entails and the various steps that go into making this effective.
The Importance Of Effective Cybersecurity Services For Small Businesses
Find out why cybersecurity services for small businesses are more in-demand than ever as cybercriminals shift their focus to less-sizable enterprises.






