Tag: IT leadership

  • Resilient learning begins with Zero Trust and cyber preparedness

    Resilient learning begins with Zero Trust and cyber preparedness

    Key points:

    The U.K.’s Information Commissioner’s Office (ICO) recently warned of a surge in cyberattacks from “insider threats”–student hackers motivated by dares and challenges–leading to breaches across schools. While this trend is unfolding overseas, it underscores a risk that is just as real for the U.S. education sector. Every day, teachers and students here in the U.S. access enormous volumes of sensitive information, creating opportunities for both mistakes and deliberate misuse. These vulnerabilities are further amplified by resource constraints and the growing sophistication of cyberattacks.

    When schools fall victim to a cyberattack, the disruption extends far beyond academics. Students may also lose access to meals, safe spaces, and support services that families depend on every day. Cyberattacks are no longer isolated IT problems–they are operational risks that threaten entire communities.

    In today’s post-breach world, the challenge is not whether an attack will occur, but when. The risks are real. According to a recent study, desktops and laptops remain the most compromised devices (50 percent), with phishing and Remote Desktop Protocol (RDP) cited as top entry points for ransomware. Once inside, most attacks spread laterally across networks to infect other devices. In over half of these cases (52 percent), attackers exploited unpatched systems to move laterally and escalate system privileges.

    That reality demands moving beyond traditional perimeter defenses to strategies that contain and minimize damage once a breach occurs. With the school year underway, districts must adopt strategies that proactively manage risk and minimize disruption. This starts with an “assume breach” mindset–accepting that prevention alone is not enough. From there, applying Zero Trust principles, clearly defining the ‘protect surface’ (i.e. identifying what needs protection), and reinforcing strong cyber hygiene become essential next steps. Together, these strategies create layered resilience, ensuring that even if attackers gain entry, their ability to move laterally and cause widespread harm is significantly reduced.

    Assume breach: Shifting from prevention to resilience

    Even in districts with limited staff and funding, schools can take important steps toward stronger security. The first step is adopting an assume breach mindset, which shifts the focus from preventing every attack to ensuring resilience when one occurs. This approach acknowledges that attackers may already have access to parts of the network and reframes the question from “How do we keep them out?” to “How do we contain them once they are in?” or “How do we minimize the damage once they are in?”

    An assume breach mindset emphasizes strengthening internal defenses so that breaches don’t become cyber disasters. It prioritizes safeguarding sensitive data, detecting anomalies quickly, and enabling rapid responses that keep classrooms open even during an active incident.

    Zero Trust and seatbelts: Both bracing for the worst

    Zero Trust builds directly on the assume breach mindset with its guiding principle of “never trust, always verify.” Unlike traditional security models that rely on perimeter defenses, Zero Trust continuously verifies every user, device, and connection, whether internal or external.

    Schools often function as open transit hubs, offering broad internet access to students and staff. In these environments, once malware finds its way in, it can spread quickly if unchecked. Perimeter-only defenses leave too many blind spots and do little to stop insider threats. Zero Trust closes those gaps by treating every request as potentially hostile and requiring ongoing verification at every step.

    A fundamental truth of Zero Trust is that cyberattacks will happen. That means building controls that don’t just alert us but act–before and during a network intrusion. The critical step is containment: limiting damage the moment a breach is successful.  

    Assume breach accepts that a breach will happen, and Zero Trust ensures it doesn’t become a disaster that shuts down operations. Like seatbelts in a car–prevention matters. Strong brakes are essential, but seatbelts and airbags minimize the harm when prevention fails. Zero Trust works the same way, containing threats and limiting damage so that even if an attacker gets in, they can’t turn an incident into a full-scale disaster.

    Zero Trust does not require an overnight overhaul. Schools can start by defining their protect surface – the vital data, systems, and operations that matter most. This typically includes Social Security numbers, financial data, and administrative services that keep classrooms functioning. By securing this protect surface first, districts reduce the complexity of Zero Trust implementation, allowing them to focus their limited resources on where they are needed most.

    With this approach, Zero Trust policies can be layered gradually across systems, making adoption realistic for districts of any size. Instead of treating it as a massive, one-time overhaul, IT leaders can approach Zero Trust as an ongoing journey–a process of steadily improving security and resilience over time. By tightening access controls, verifying every connection, and isolating threats early, schools can contain incidents before they escalate, all without rebuilding their entire network in one sweep.  

    Cyber awareness starts in the classroom

    Technology alone isn’t enough. Because some insider threats stem from student curiosity or misuse, cyber awareness must start in classrooms. Integrating security education into the learning environment ensures students and staff understand their role in protecting sensitive information. Training should cover phishing awareness, strong password practices, the use of multifactor authentication (MFA), and the importance of keeping systems patched.

    Building cyber awareness does not require costly programs. Short, recurring training sessions for students and staff keep security top of mind and help build a culture of vigilance that reduces both accidental and intentional insider threats.

    Breaches are inevitable, but disasters are optional

    Breaches are inevitable. Disasters are not. The difference lies in preparation. For resource-strapped districts, stronger cybersecurity doesn’t require sweeping overhauls. It requires a shift in mindset:

    • Assume breach
    • Define the protect surface
    • Implement Zero Trust in phases
    • Instill cyber hygiene

    When schools take this approach, cyberattacks become manageable incidents. Classrooms remain open, students continue learning, and communities continue receiving the vital support schools provide – even in the face of disruption. Like seatbelts in a car, these measures won’t prevent every crash – but they ensure schools can continue to function even when prevention fails.

    Latest posts by eSchool Media Contributors (see all)

    Source link

  • A practical guide for sourcing edtech

    A practical guide for sourcing edtech

    Key points:

    Virtual reality field trips now enable students to explore the Great Wall of China, the International Space Station, and ancient Rome without leaving the classroom.  Gamified online learning platforms can turn lessons into interactive challenges that boost engagement and motivation. Generative AI tutors are providing real-time feedback on writing and math assignments, helping students sharpen their skills with personalized support in minutes.

    Education technology is accelerating at a rapid pace–and teachers are eager to bring these digital tools to the classroom. But with pandemic relief funds running out, districts are having to make tougher decisions around what edtech they can afford, which vendors will offer the greatest value, and, crucially, which tools come with robust cybersecurity protections.

    Although educators are excited to innovate, school leaders must weigh every new app or online platform against cybersecurity risks and the responsibility of protecting student data. Unfortunately, those risks remain very real: 6 in 10 K-12 schools were targeted by ransomware in 2024.

    Cybersecurity is harder for some districts than others

    The reality is that school districts widely vary when it comes to their internal resources, cybersecurity expertise, and digital maturity.

    A massive urban system may have a dedicated legal department, CISO, and rigid procurement processes. In a small rural district, the IT lead might also coach soccer or direct the school play.

    These discrepancies leave wide gaps that can be exploited by security threats. Districts are often improvising vetting processes that vary wildly in rigor, and even the best-prepared system struggles to know what “good enough” looks like as technology tools rapidly accelerate and threats evolve just as fast.

    Whether it’s apps for math enrichment, platforms for grading, or new generative AI tools that promise differentiated learning at scale, educators are using more technology than ever. And while these digital tools are bringing immense benefits to the classroom, they also bring more threat exposure. Every new tool is another addition to the attack surface, and most school districts are struggling to keep up.

    Districts are now facing these critical challenges with even fewer resources. With the U.S. Department of Education closing its Office of EdTech, schools have lost a vital guidepost for evaluating technology tools safely. That means less clarity and support, even as the influx of new tech tools is at an all-time high.

    But innovation and protection don’t have to be in conflict. Schools can move forward with digital tools while still making smart, secure choices. Their decision-making can be supported by some simple best practices to help guide the way.

    5 green flags for evaluating technology tools

    New School Safety Resources

    With so many tools entering classrooms, knowing how to assess their safety and reliability is essential. But what does safe and trustworthy edtech actually look like?

    You don’t need legal credentials or a cybersecurity certification to answer that question. You simply need to know what to look for–and what questions to ask. Here are five green flags that can guide your decisions and boost confidence in the tools you bring into your classrooms.

    1. Clear and transparent privacy policies

    A strong privacy policy should be more than a formality; it should serve as a clear window into how a tool handles data. The best ones lay out exactly what information is collected, why it’s needed, how it’s used, and who it’s shared with, in plain, straightforward language.

    You shouldn’t need legal training to make sense of it. Look for policies that avoid vague, catch-all phrases and instead offer specific details, like a list of subprocessors, third-party services involved, or direct contact information for the vendor’s privacy officer. If you can’t quickly understand how student data is being handled, or if the vendor seems evasive when you ask, that’s cause for concern.

    1. Separation between student and adult data

    Student data is highly personal, extremely sensitive, and must be treated with extra care. Strong vendors explicitly separate student data from educator, administrator, and parent data in their systems, policies, and user experiences.

    Ask how student data is accessed internally and what safeguards are in place. Does the vendor have different privacy policies for students versus adults? If they’ve engineered that distinction into their platform, it’s a sign they’ve thought deeply about your responsibilities under FERPA and COPPA.

    1. Third-party audits and certifications

    Trust, but verify. Look for tools that have been independently evaluated through certifications like the Common Sense Privacy Seal, iKeepSafe, or the 1EdTech Trusted App program. These external audits validate that privacy claims and company practices are tested against meaningful standards and backed up by third-party validation.

    Alignment with broader security frameworks like NIST Cybersecurity Framework (CSF), ISO 27001, or SOC 2 can add another layer of assurance, especially in states where district policies lean heavily on these benchmarks. These technical frameworks should complement radical transparency. The most trustworthy vendors combine certification with transparency: They’ll show you exactly what they collect, how they store it, and how they protect it. That openness–and a willingness to be held accountable–is the real marker of a privacy-first partner.

    1. Long-term commitment to security and privacy

    Cybersecurity shouldn’t be a one-and-done checklist. It’s a continual practice. Ask vendors how they approach ongoing risks: Do they conduct regular penetration testing? Is a formal incident response plan in place? How are teams trained on phishing threats and secure coding?

    If they follow a framework like the NIST CSF, that’s great. But also dig into how they apply it: What’s their track record for patching vulnerabilities or communicating breaches? A real commitment shows up in action, not just alignment.

    1. Data minimization and purpose limitations

    Trustworthy technology tools collect only what’s essential–and vendors can explain why they need it. If you ask, “Why do you collect this data point?” they should have a direct answer that ties back to functionality, not future marketing.

    Look for platforms that commit to never repurposing student data for behavioral ad targeting. Also, ask about deletion protocols: Can data be purged quickly and completely if requested? If not, it’s time to ask why.

    Laying the groundwork for a safer school year

    Cybersecurity doesn’t require a 10-person IT team or a massive budget. Every district, no matter the size, can take meaningful, manageable steps to reduce risk, establish guardrails, and build trust.

    Simple, actionable steps go a long way: Choose tools that are transparent about data use, use trusted frameworks and certifications as guideposts, and make cybersecurity training a regular part of staff development. Even small efforts , like a five-minute refresher on phishing during back-to-school sessions, can have an outsized impact on your district’s overall security posture.

    For schools operating without deep resources or internal expertise, this work is especially urgent–and entirely possible. It just requires knowing where to start.

    Latest posts by eSchool Media Contributors (see all)

    Source link

  • Ryan Lufkin, Vice President of Global Academic Strategy, Brings the Skinny

    Ryan Lufkin, Vice President of Global Academic Strategy, Brings the Skinny

    When the developers of Canvas, the world’s leading web-based learning management system (LMS) software, invite you to a party—July 22-24 this year in Spokane, WA—you might consider the offer. Expected to draw 3,000 attendees across various roles from individual educators to IT leadership, the event promises product reveals, professional development, and collaborative opportunities like Hack Night, designed to help educators and administrators demonstrate tangible value when they return to their institutions. I was able to grab Ryan Lufkin, Vice President of Global Academic Strategy at Instructure, for some pre-show scuttle butt. Have a listen and scroll down for some highlights:

    ➜InstructureCon 2025 is evolving its AI strategy beyond basic features to an “agentic approach,” leveraging partnerships with Anthropic, Microsoft, and Google to create integrated AI experiences across campus environments. Says Ryan: “That’s because our open architecture is the most well-positioned learning platform in the world to really pull in, not just those AI-powered features that we’ve developed, but we also leverage those from our partners.”

    ➜Instructure is responding to educational institutions’ budget constraints by focusing on helping customers maximize their technology investments through better data usage, adoption metrics, and optimization strategies. Says Ryan: “We really want educators and administrators to walk away with just a toolkit of how to use these products better, how to use them more deeply and tangibly show that value because we know the budgets are tight.”

    A few session highlights:  

    Transforming Student Success with Mastery Connect: A Proven Approach to Data-Driven Instruction in Richland One School District

    Get ready to discover how Richland One (R1) School District in South Carolina has been transforming student success with Mastery Connect since 2015! This digital assessment platform has empowered R1 teachers to seamlessly administer standards-based formative and summative assessments, dive into score reports, and collaborate with colleagues. MC has unlocked deeper insights into student mastery, giving teachers and teams the tools they need to drive data-driven instruction. Join us for an exciting session where R1 will share its curriculum map structure and district approach to formative assessments. Discover how to save time on data collection and analysis—whether you’re a teacher or an admin. Learn how newer features like Quick Reassess and Assessment Compare can help you work smarter, not harder! You’ll also explore how to harness real-time data to fuel impactful discussions in your Professional Learning Communities (PLCs), driving focused, results-oriented collaboration.

    Cracking the Code: Turning Data into Action with Mastery Connect

    Drowning in data but struggling to make it meaningful? Join us on a journey to transform numbers into actionable insights using Mastery Connect! In this session, we’ll share how we built educator buy-in, shifted mindsets, and empowered teachers to use data in meaningful ways. Discover practical strategies for making data analysis approachable, actionable, and impactful—without overwhelming teachers. We’ll explore real-world examples, time-saving tips, and effective ways to connect assessment data to instructional decisions. Whether you’re just getting started or looking to refine your approach, this session will equip you with insights and strategies to turn data into a catalyst for student success.

    Beyond the Classroom: Maximizing Canvas for Non-Academic Programs in Resource-Limited Environments.

    As institutions face financial and regulatory challenges, maximizing existing technology investments is essential. While Canvas is primarily used for academic courses, its capabilities extend beyond the classroom. This session explores how a small liberal arts institution has successfully repurposed Canvas for faculty onboarding, professional development, syllabus archiving, student organizations, and institutional assessment—all without additional costs. A key focus will be the development of a syllabus submission portal designed to streamline syllabus collection, ensure compliance with learning outcomes, and create a structured faculty repository. Attendees will gain practical insights into overcoming adoption challenges, achieving measurable ROI, and applying these strategies to institutions of varying sizes.

    Kevin Hogan
    Latest posts by Kevin Hogan (see all)

    Source link