Search Results
You searched for "security"
How can edtech help shore up school districts' data security? Mike Bianco, CISSP, explains how vendors can help school IT leaders create a culture of security.
Use Task-Based Permission to Tighten Edtech SecuritySet up permissions based on which tasks employees must perform, rather than allowing access based on cookie-cutter roles.
Guest Post: Amping Up Your School SecurityUse technology to increase building security and more.
One-Page Pitch: Data SecurityData security is a big and expensive prospect for school districts. Here's a downloadable pitch to get leadership on board.
4 Essential Security Features for Your Business OfficeLearn four simple ways you can protect your school business office from business email compromise attacks from Skyward's VP of Info Security Mike Bianco.
School Districts for RansomPrepare ahead of time before ransomware threats emerge. Backup data, plan for recovery, and train everyone to shore up your human firewall.
The Emotional Toll of Data Security in the Business OfficeBusiness email compromise (BEC) exploits the school business office through phishing emails. Proactive training plans help build the SBO's confidence.
Security Drill: 3 Threats to Watch ForSecurity is paramount in school districts and their expanding networks. Watch for these three threats and keep yourself safe.
Future-Proof Record RetentionAs technology grows and changes, data retention seems complicated. Keep the basics in mind to form a solid strategy.
The Cost of Proactive vs. Reactive Data SecurityInvesting in your district's data security? Here's why being proactive pays dividends as ransomware risks increase for school districts.
The Data Security Starting FiveSee how different IT roles come together to maximize data security in school districts
Beware These 5 Threats During COVID-19Hackers don't let up, even for emergencies. Protect your network, be careful transferring files, beware surveys and prize offers, and model security to students.
FERPA and Your Student Information SystemFERPA protects student data by specifying who can legally see it. Learn how your SIS follows that guideline.
The Golden Rule of InteroperabilityThe golden rule of interoperability is simple: Keep data privacy in a position of importance.
An Intro to Single Sign On SecurityFind out how single sign on works as a security feature, in addition to saving time for students, teachers, K12 administrators, and staff.
Why Edtech Choices Matter So MuchSecurity, content, and support matter for edtech choices, especially since it's a huge investment for districts.
Without People, Cybersecurity Falls FlatIT pros in K12 schools cannot rely on software alone to keep their school network protected. Instead, construct a strong training program for every person in the district to know what to do to keep the network safe.
3 Strategies for Holistic CybersecurityThere's no need to buy more security software when you maximize the capabilities of your existing solutions. Get your leaders on board, students on board, and lean on your edtech partners for support.
7 Resolutions for Edtech in 2025As a new calendar year dawns, it's time to pursue edtech excellence. Here are the top ways to grow in K12 edtech in 2025.
1974: A Brief History of Student Data PrivacyAdvancing K12 Blog: A lot can change in 40 years… but the guiding piece of legislation protecting the privacy of student education records hasn’t. Does your district understand FERPA? And are you doing everything necessary to keep student data secure? Watch this video to find out.