
The Challenge
Like most school districts the main challenge is a lack of time; too much to do with not enough resources. At Lake Dallas ISD an IT Department of six has responsibility for 650 staff members, 4000 students, 5000 Chromebooks, and 1500 windows devices.
Mike Dabney, the Director of Technology at Dallas ISD shared his thoughts on the day to day stress of the job, “with so much to manage 24/7, we are constantly in fire-fighting mode. The risk of cyberthreats has never been higher, and we must contend with the threats from both inside and outside of the district network. Being a previous victim of a ransomware attack, we know all too well that the external threat from bad actors is very real, but as vigilant as we are, lack of time is our biggest concern”.
The Solution
Following a ransomware attack last spring, Lake Dallas ISD began using an EDR solution recommended by the vendor tasked with helping with the remediation. In the months following, Mike decided to look into other solutions to help mitigate the risk of further attacks. Lake Dallas ISD was introduced to BlackFog while evaluating a few other EDR solutions.
Lake Dallas ISD made the decision to deploy BlackFog to select devices to evaluate the solution. “We were so busy it was hard to find the time to evaluate multiple solutions, but the concept of anti data exfiltration technology was interesting, so we decided to give BlackFog a try.”
The Approach
“BlackFog’s Enterprise console was straightforward and intuitive. We didn’t need to read any manuals to be comfortable with the product. It worked well alongside the EDR solutions which was also a big plus. During the trial we deployed BlackFog across some of the student lab computers and all of our servers and we found that BlackFog was reporting on different things. Whereas EDR was looking at what was coming into the network, BlackFog was watching the back door, which was an interesting approach”, commented Mike.
The Results
During the trial Mike and his team became comfortable with the solution and deployed it on additional systems. Until school started Mike and his team didn’t see a lot of interesting activity in the console, so they felt they needed more time to use the product. Mike commented, “we decided to purchase some additional licenses and we are really glad to have it”.
“BlackFog reports in a different way, and from a different angle to other solutions, so we are seeing things we don’t usually get to see. I’m in the console every day and it’s not a chore to manage, but the biggest plus is that it’s doing something specific and unique. I particularly like the Threat Hunting feature where I can drill into specific events for more details; it can help you discern if it’s a false positive or not or dig deeper. The hourly impact report is also interesting. If I see activity in the middle of the night, I want to know what that is”.
When asked if he would recommend the solution to other school districts, Mike commented, “Absolutely. The BlackFog solution has proven to be a great resource in helping protect our data, and I am grateful to have this resource at our disposal. BlackFog will manage it for you, 24/7, providing another resource to help ensure your data doesn’t end up in the hands of cybercriminals. I’d recommend any organization do what they can to mitigate cybersecurity risks, as the fallout is always worse than you expect. Prevention really is key.”
Related Posts
The World’s Largest Credential Leak Hits 16 Billion Records
The world’s largest credential leak exposed 16 billion records, including passwords, session tokens, and infostealer malware data. Learn what happened and how to stay protected.
The State of Ransomware 2025
BlackFog's state of ransomware report 2025 measures publicly disclosed and non-disclosed attacks globally.
Iran Hacked Trump Campaign: A Deep Dive into the Cyberattack
An overview of how Iranian IRGC hackers penetrated Trump's campaign through spear-phishing, leaked sensitive data to influence opponents, and the DOJ's subsequent response.
Microsegmentation: Strengthening Network Security Against Zero Day Exploits
Find out why microsegmentation is an increasingly popular option for supporting zero trust networking approaches.
Patch Management: An Essential Part of Data Security
Ensuring you have a strong patch management strategy in place is essential in minimizing the risks posed by known vulnerabilities.
Layered Security – How a Defense-in-Depth Approach Guards Against Unknown Threats
Make sure your systems are fully protected from threats at every level by incorporating these six key layered security defense strategies.