Considering the vast amount of student data being collected, network security should be top of mind to all school faculty and IT decision makers. The K-12 Blueprint Security toolkit - developed with generous support from CDW-G* - includes resources and materials to help school technology leaders make the best decisions to ensure the safety of all school information.

Test Faculty Awareness of Email Scams

All it takes is one employee reeled in by a phishing scam to put your network at risk. These sample Phishing Tests will measure how savvy your staff is.

Data Security Advice for K-12 Leaders

School faculty need the knowledge and skills necessary to strengthen security policies and procedures

Cybersecurity for K-12 Schools and Districts

Implementing data security procedures for a school or district should be a dynamic and ever-evolving process 

Establishing a Zero Trust Ecosystem

There are several elements necessary to create a “perfect storm” of security: a Zero Trust Ecosystem

Saving Lives with Technology

Mark Finstrom—CTO for Highline School District—discusses how process and technology come together to save the lives of at-risk students

Evaluating your District's Cybersecurity Readiness

Understand the techniques that cyberhackers employ, and how they can exploit your district's vulnerabilities

District Security Self-Assessment Checklist

A checklist from CoSN (the Consortium for School Networking) to help gauge a district’s security readiness

Cybersecurity and the Cloud

After the pandemic, K-12 schools may never be the same. And cybercriminals are making the most of it.

Cybersecurity is Everyone’s Job

This National Initiative for Cybersecurity Education Working Group guidebook outlines role-based protections

Security Planning Rubric

A rubric from CoSN (the Consortium for School Networking) that districts can use to determine security preparedness

Questions to Ask Online Service Providers

A list from CoSN (the Consortium for School Networking) of key security questions to discuss with your provider

Making the Case for Security

A sample security presentation that can be easily modified and adapted for your own use when sharing information or securing buy-in

Security Threats to Prepare For

While districts are falling behind on security due to constraints, cybercriminals are becoming shrewder

Security monitoring image
The Cybersecurity Threats that Keep K-12 CIOs Up at Night

This article was originally published on EdTechMagazine.

Computer code on a screen
Back from Disaster

This article was originally published on EdTechMagazine.