澳门跑狗论坛

Special Report
Privacy & Security

6 Steps for Preventing and Cleaning Up Cyberattacks

By Sean Cavanagh 鈥 March 19, 2019 4 min read
Conceptual image showing varying shades of blue and white numbers representing data and a lock with a computer's power button inside the lock's key hole.
  • Save to favorites
  • Print
Email Copy URL

Districts face an intimidating array of cybersecurity threats. What are some of the common-sense steps they can take to make sure they鈥檙e protected, or that they鈥檙e at least lessening the risks?

1鈥擠etermine the systems you need to protect the most and build your cyber protections out from there.

Districts should identify information鈥攕uch as students鈥 personal data, or financial records鈥攖hat must be safeguarded and set a 鈥渂aseline of controls鈥 around that information, says Doug Levin, the president of EdTech Strategies, LLC.

The first steps in protecting that information from hackers are likely to include actions such as running anti-virus products, having proper firewalls, and segmenting networks so a hacker can鈥檛 get access to everything at once.

More sophisticated protections can be scaffolded on from there, such as two-factor password authentication. But many of those more rigorous steps require a heavier lift from the IT department, and potentially for district employees and students. Districts need to make a judgment about how sophisticated hackers coming after their information are likely to be, says Levin, and what protections are worth it.

2鈥擳rain your staff, and retrain them.

Teachers, administrators, and other employees need help on how to identify threats. And they need reminders throughout the year. Some districts have sought to make this training engaging, through videos and gamification.

As part of their training, staff should be given information that details what phishing e-mails and other scams look like. When districts are hit by cyberattacks, it鈥檚 often because staff members don鈥檛 recognize the threat. As one district administrator told 澳门跑狗论坛: 鈥淥ur biggest threat is ourselves.鈥

In addition, key staff should regularly be trained on how to respond to crises, and the K-12 system鈥檚 crisis plan should be revised after an attack, based on how well the district performs during a simulation, according to a checklist put forward by the Consortium for School Networking.

3鈥擳hink about restricting administrative access.

Some districts don鈥檛 allow teachers, students, or even top district administrators to download software on their machines that could allow malware or a virus to penetrate their networks.

About This Report

This 澳门跑狗论坛 examination of K-12 cybersecurity is the second of three special reports focused on the needs of K-12 district technology leaders, including chief technology officers. Each report in the series features exclusive results of a new, nationally representative survey of CTOs, conducted by the Consortium for School Networking, an organization representing K-12 district technology officials.

This doesn鈥檛 mean district officials can鈥檛 download anything. But it means they can鈥檛 download resources that will install software or make system changes that could infect a machine and eventually a network, says Melissa Tebbenkamp, the director of instructional technology for the 9,000-student Raytown, Mo., Quality Schools, which has put in place those types of controls.

Keep in mind that in many districts, restricting administrative access will come as a huge cultural shift, especially for teachers and administrators who are used to downloading what they want. Try to figure out what essential resources these staff need to do their jobs, then limit the amount of freelance downloading of software on devices throughout the district.

4鈥擧ave an emergency-response plan in place for when a cyberattack hits.

Key personnel in a district should be trained on how to respond to a cybersecurity crisis, which means putting staff through simulations of attacks, advises CoSN. Districts need to make sure that plan has been updated relatively recently; COSN advises a refresh at least every two years.

District tech leaders should also be prepared in other ways. They should know who their point of contact is in local law enforcement, advises Levin. And they should make sure the school system鈥檚 attorney knows about cyber threats and how the district should respond.

In addition, K-12 officials need to know whether the district and its vendors have cyber insurance, and what it covers. Pinning all of this down up front is easier than trying to scramble for help after a crisis has struck.

5鈥擬onitor your networks for intrusions.

CoSN recommends that districts have live monitoring in place to keep track of network intrusions and viruses.

That鈥檚 important, because the focus of many hackers is not stealing students鈥 or school employees鈥 personal information, says Tebbenkamp. For some, the main focus is 鈥渞esource utilization鈥濃攇aining access to the district鈥檚 network to launch attacks on other users, so the attack can鈥檛 be traced back to the hacker. If a district is tracking information on its server, it has a better chance of knowing when malicious activity is underway.

6鈥擲et clear expectations for education and technology companies.

Make sure you have a point person or group of people who are evaluating software for data-security and vulnerabilities. That evaluation needs to occur even if a district is only using an ed-tech product for a short term, such as with a pilot, says Tebbenkamp.

She also advises districts to have data-governance contracts with vendors, ensuring that they follow best practices. Contract provisions include making sure data is secure, including the times when it is transmitted; that any company staff who come in contact with district data have background checks; and that data gets deleted when it is no longer needed by the school district.

Events

School Climate & Safety K-12 Essentials Forum Strengthen Students鈥 Connections to School
Join this free event to learn how schools are creating the space for students to form strong bonds with each other and trusted adults.
This content is provided by our sponsor. It is not written by and does not necessarily reflect the views of 澳门跑狗论坛's editorial staff.
Sponsor
Assessment Webinar
Standards-Based Grading Roundtable: What We've Achieved and Where We're Headed
Content provided by Otus
This content is provided by our sponsor. It is not written by and does not necessarily reflect the views of 澳门跑狗论坛's editorial staff.
Sponsor
Reading & Literacy Webinar
Creating Confident Readers: Why Differentiated Instruction is Equitable Instruction
Join us as we break down how differentiated instruction can advance your school鈥檚 literacy and equity goals.
Content provided by 

EdWeek Top School Jobs

Teacher Jobs
Search over ten thousand teaching jobs nationwide 鈥 elementary, middle, high school and more.
Principal Jobs
Find hundreds of jobs for principals, assistant principals, and other school leadership roles.
Administrator Jobs
Over a thousand district-level jobs: superintendents, directors, more.
Support Staff Jobs
Search thousands of jobs, from paraprofessionals to counselors and more.

Read Next

This content is provided by our sponsor. It is not written by and does not necessarily reflect the views of 澳门跑狗论坛's editorial staff.
Sponsor
Privacy & Security Quiz
Quiz Yourself: How Much Do You Know About Cybersecurity For Schools And Districts?
Answer 6 questions about actionable cybersecurity solutions.
Content provided by 
Privacy & Security A New Federal Taskforce Targets Cybersecurity in Schools
The 鈥済overnment coordinating council" aims to provide training, policies, and best practices.
3 min read
Illustration of computer and lock.
iStock / Getty Images Plus
Privacy & Security Q&A Why One Tech Leader Prioritizes Explaining Student Data Privacy to Teachers
Jun Kim, the director of technology for an Oklahoma school district, helped build a statewide database of vetted learning platforms.
3 min read
Jun Kim, Director of Technology for Moore Public Schools, poses for a portrait outside the Center for Technology on Dec. 13, 2023 in Moore, Okla.
Jun Kim, is the director of technology for the Moore school district in Moore, Okla., He has made securing student data a priority for the district and the state.
Brett Deering for 澳门跑狗论坛
Privacy & Security A Massive Data Leak Exposed School Lockdown Plans. What Districts Need to Know
More than 4 million records held by school safety software company Raptor Technologies were left inadvertently exposed online.
5 min read
Concept image of security breach, system hacked alert with red broken padlock icon showing vulnerable access.
Nicolas Herrbach/iStock/Getty