Cyber Eyes Wide Open is a Texas ESC K-12 initiative to assist LEAs in improving their cybersecurity posture, from implementing best security practices to configuring and utilizing free resources to monitor and protect digital resources.
LEAs can implement cybersecurity resilience through strategies and tools that monitor internet-facing servers and websites, alert for network vulnerabilities, block malicious emails, protect DNS services, and verify best practices and access to systems.
Many of the services mentioned in Cyber Eyes Wide Open are generally offered at no cost from MS-ISAC, CISA, ESC Region 12, Scinary, Vailmail, and others.
NOTE: LEAs will need access to DNS to change some of the recommended settings.
EDR (End Point Protection)
Cybersecurity Insurance
Internal Assessment
We have done our best through this site to gather resources for the Cyber Eyes Wide Open initiative that are no cost, open source, or discounted for LEAs to implement. The phrase “Time is Money,” however, does apply. The LEA will need to spend some time setting up some of the no-cost services, like those from MS-ISAC as well as configuring DMARC, DNSSEC, and other services. ESC Region 12 believes in the importance of DMARC and DNSSEC and will assist any LEA at no cost to set up these services. Contact K12CyberEyesWideOpen@esc12.net for assistance.
Unique email address
MS-ISAC IP and Domain Monitor, Internet Facing Network Vulnerability Monitoring, Malicious-Domain blocking and reporting, and the DMARC report for the Securing District Email Systems all require an email address that an LEA employee should monitor for information such as reports.
The LEA should consider creating a group email, alias email, or a special account for these services. This will assist in the continuing flow of information if staff change.
DNS Administrator
LEAs will need access to or the ability to request DNS changes as many of the services mentioned above require changes to DNS for the LEA’s domain.
System Administrator
Many of the services mentioned in Cyber Eyes Wide Open will require a System Administrator(s) to set up service(s), monitor service(s), and mitigate any issues that may arise.
Unfortunately, there is no full-proof way to stop all attacks, but if the LEA implements the services and best practices outlined in Cyber Eyes Wide Open Checklist, it WILL greatly reduce the LEA’s risk of a cyber security incident.