Here's what we found...
Results for "security"
3 Ways for Students to Steal Your Password
/blogs/ak12/2018/november/3-ways-for-students-to-steal-your-password
Students can use technology to learn or to cause mischief. Protect your credentials and the school network.
IT is the Real MVP
/blogs/ak12/2023/december/it-is-the-real-mvp
Here's what the list of tasks for a typical K12 school IT professional might look and feel like, and how vendor teams can help take the pressure off.
The One-Way Valve of Interoperability
/blogs/ak12/2022/april/the-one-way-valve-of-interoperability
Learn how K12 edtech interoperability saves time and increases security.
Too Much Access: The FERPA Compliance Gap
/blogs/ak12/2015/september/too-much-access-the-ferpa-compliance-gap
Advancing K12 Blog: What does the "legitimate educational interest" clause of FERPA have to do with your SIS? Here's how you can avoid the kind of audit failures that have plagued school districts throughout the country.
Vetting Apps Across the District
/blogs/ak12/2020/february/vetting-apps-across-the-district
What should teachers watch out for when downloading classroom apps? These 6 FERPA related flags can lead the way to safer digital experiences.
How Data Standards Safeguard School Data from Ransomware
/blogs/ak12/2023/august/how-data-standards-safeguard-school-data-from-ransomware
Choosing a data standard offers more options for cybersecurity strategy as well as an easier administrative load for many users.
|
Humanity 🤝 Technology Edtech insight delivered directly to you. |
|
Humanity 🤝 Technology Edtech insight delivered directly to you. |