Beware of ransomware: Here’s how to protect your district

A new, disturbing pattern has cropped back up that is reminiscent of some nasty behavior from the early days of Internet nefarious exploits: targeting schools and students and the innocent. Ransomware attacks have been making headlines in recent months—particularly as a threat to K-12. Both Roseburg (OR )Public Schools and Leominster (MA) Public Schools were two of the latest victims of cyber-abuse.

A history of hacking
21 years ago, I got a call at my first internet security startup company (Signal 9 Solutions, later acquired by McAfee) asking for help; a woman’s son had cognitive challenges and disabilities, and she thought he was the victim of hacking. She had seen a news piece about cyberhacking, and she thought this might be a case.

At the time, we focused on enterprise sales and cryptographic solutions, but we had accidentally invented the personal firewall for telecommuting, put a beta version of this new standalone personal firewall on our website, and started a forum talking about it.…Read More

Building a smarter network

Given the data, networking, and security implications of upcoming technology trends, K-12 schools will require a variety of innovations to meet dramatically increased wireless and wired network performance demands without adding more stress on overworked IT staffers.

We recommend the following strategies:

1. Adopt smart infrastructure.
To keep IT overhead low while delivering the performance required to power Internet of things (IoT) devices, augmented reality/virtual reality (AR/VR) applications and whatever comes next, invest in more intelligent networking infrastructure. At the wired networking layer, replace your outdated switching paradigm with a modern platform that supports the new IEEE 802.3bz standard for multi-gigabit Ethernet and is driven by an advanced software operating system.…Read More

The biggest changes to school security in 2018

The complexity of ensuring our schools and education facilities are both safe and secure has grown tremendously. Brass key systems are increasingly supplemented with secure credentials as access management has become more critical. The continued development of mass notification systems and video surveillance has made them critical components of a holistic security solution. And now, a major next step is upon us in the evolution of physical security as we look to more effectively manage lock-down procedures.

In the past five years, the biggest change in school security has been to transition from the idea of the big red button–where a single action locks all openings–to a more sectored approach. The new way of thinking is that the big red button locks down perimeter and exterior doors, but interior doors are locked locally based on location, situation, and teacher and faculty decision.

When discussing why this change is appropriate, it is important to look at the specific needs of education campuses today. Physical school security can be broken down to subsections, including perimeter fencing and gates, the building exterior, visitor-access management, and interior spaces. In previous iterations of lockdowns, systems were developed that allowed one system to lock every door: the centrally controlled, universal-lockdown concept.…Read More

Report: 4 security recommendations to keep student data safe

Educators have relied on data to make informed decisions for as long as it’s been available (the foundations of standardized testing got its start in the 19th century).

For much of that time, the main worry was whether or not that data was being accurately interpreted. Technology, of course, has radically improved how we collect and analyze data, but has thrown a new wrench into its use — mainly regarding ethics, privacy, and safety.

Chief among these concerns are breaches into school systems and accidental data leaks, according to a new report on data privacy from the Southern Regional Education Board, a collective that works with K-12 and higher ed policy leaders in 16 southern states. The report, titled Data Privacy and Security, mentions a number of pressing concerns regarding education data and makes several recommendations for how states and education agencies can stay safe and transparent as they collect, govern, and share student data.…Read More

Blackboard launches New Learning Experience platform

Integrated platform enables personalized learning, streamlined communication with family and community engagement, and unified workflows

Blackboard has launched a new K-12 platform for districts and schools that brings together institutions, parents, teachers, and learners in an integrated approach that addresses fundamental requirements for student success including school safety and security, family and community engagement and personalized competency-based learning.

Blackboard’s offering combines multiple products, integrations, and professional services that can be deployed individually or as a comprehensive solution.

Technologies include: Blackboard Mass Notifications™ (formerly Blackboard Connect™), Blackboard Web Community Manager™ (formerly Blackboard Schoolwires™), Blackboard Mobile Communication App™ (formerly Blackboard Parentlink™), Blackboard Social Media Manager™ (formerly Sociability™), Blackboard Collaborate™, Blackboard Blackboard Open Content (formerly xpLor), and a choice of Blackboard’s leading learning management systems: Blackboard Learn™ or Moodlerooms™ and their mobile apps for students and teachers.…Read More

How every school can promote safety in a digital world

Keeping students safe in the digital era — with its myriad dangers — means a proactive IT strategy

Technology has become a mainstay within the walls of today’s schools. One-to-one computing is enhancing and enriching the student experience, transforming the way we teach and the way we learn.

K-12 schools were expected to spend approximately $4.7 billion on technology this past year, according to IDC, with no sign of a plateau. But as rapid technology adoption continues unabated, the safety of the students who are meant to benefit from these advances is frequently overlooked.

The evolution of learning with computers

When desktop computers first appeared in schools, the curriculum focused on typing, word processing, and basic coding skills. Then search engines arrived, completely revolutionizing the way students accessed and consumed information over the web.…Read More

How safe is my student data?

Ed tech companies are not immune to hackers and vulnerabilities. But schools can protect themselves

data-safetyA few years ago I was attending a meeting at my county office, where a vendor who runs a popular education site was making a presentation. If I’m being honest, I’ll admit I wasn’t paying close attention. It was a product our district was already using, and I was our top level administrator for my district’s domain on the site. Stifling a yawn or two, I started to do what any bored student would do—see if I could break stuff.

Eventually, I happened upon an exploit by chance. I was working both in my district’s instance (the domain and accounts registered for our schools) as well as the one the county office set up for this presentation. Sometimes when I signed out of one, it signed me out of the other as well.

I signed into my district as the top-level admin, and then redirected to the county site by simply changing the URL. In doing so I gained top level privileges to the county’s instance, too, which should have been reserved exclusively for the vendor reps making the presentation. I raised my hand and asked, “Do you know someone can gain higher privileges than they should have?”…Read More

BYOD to school? 5 tips for keeping student devices secure

Whether in junior high or in college, many students have one thing in common: a smartphone or tablet is in their pocket or backpack, the Huffington Post reports. According to eMarketer, by the end of 2013, smartphone users will represent over half of all mobile phone users. And by 2016, nearly three in five Americans will have a smartphone, including students. This movement has many school officials and parents biting their nails in anticipation all of these new devices connecting to their network and in the hands of kids. How can a university, school or parent possibly control what is added to a mobile device and what is taken away? Certainly mobile devices make life easier. For many Millennials, computing is an extension of who they are, and it just makes sense that these tools go with them into the classroom…

Read more

…Read More

FETC 2010: Security

Fujitsu's PalmSecure
Fujitsu's PalmSecure

Absolute Software said its Computrace LoJack for Laptops service, which helps schools recover lost or stolen laptops, now includes remote locking and messaging capabilities that take advantage of Intel Anti-Theft Technology. When a computer is reported missing, its owner can “lock down” the operating system, rendering the machine useless to unauthorized users. Once the computer is back in the hands of its rightful owner, it can be unlocked through the customer’s LoJack for Laptops account or by typing a password on the computer. To activate the system, users must buy a subscription ranging from one to four years in length.

Black Box Network Services introduced Veri-NAC, a network access control (NAC) system to help protect against network vulnerability. Veri-NAC is a family of NAC appliances that ensure only authorized devices can access a school or district network. The appliances also screen for vulnerabilities in computers connected to the network. If Veri-NAC detects an untrusted asset, it shuts off network access for that device instantly—protecting the network while keeping trusted devices securely online. …Read More