EdTech is being implemented throughout schools to improve productivity, aid in learning, and prepare students for the digital world. While EdTech offers a variety of benefits to both students and teachers, the technology can also be the target of malicious attacks. Connected educational technology has been the target of ransomware attacks, account takeover, and data security risks for schools.
Education is the second-ranked target for cybercriminals behind local government. In July and August alone, over 160 security problems were reported from schools – a problem that continues to grow.
“Something nearly all of us take for granted is access. With increased accessibility to a broad range of files and devices within our networks, far too many individuals have too much access to too many things,” said Brandon Shopp, Vice President of Product Strategy at SolarWinds.
How can schools secure networks with apps, devices, and operating systems that are constantly accessing networks?
IT officers can follow these four steps to ensure cybersecurity.
Implementing a 24/7 monitoring system can help schools ensure security. The system monitors activity, abnormal behavior, and works to shut down malicious attacks that could result in phishing emails or account takeovers.
Classifying the risk potential of the EdTech and SaaS applications that are connected to a network is important. Once classified, IT officers can take action automatically or manually prohibit or remove an application.
Check Cloud Safety
Make sure to audit the cloud and identify anything that may be missing or shouldn’t have access. G Suite, for example, offers education security features that should be leveraged to work towards better cybersecurity.
Create EdTech Policy
Once monitoring is implemented, risk is calculated, and the cloud is cleared, it’s important to keep these actions constant. By creating an EdTech manual for security, teachers and staff can be educated on cyber best practices and become the frontline in securing the school’s network.
“Why is training so important? Because implementing all the best technology in the world will not automatically stop an attack,” said Jim Hansen, Vice President of Products and Security at SolarWinds. “The reality is, taking a more holistic approach to IT security by balancing security awareness training and security technologies is far and away the best approach.”
Ready to learn more? Watch this webinar.