email
Get the newsletter
Newsletter
search
Search blog
February 08, 2023 • read

Technology Tips: February 2023 Edition

Skyward IT Services
Network and Infrastructure Security Specialists

In this article
Share this story

Follow the 3-2-1 backup rule

Do you have a solid disaster recovery plan in place? The time to answer that question is now—not when you find out you need it. If you want high security for your data, we recommend following the 3-2-1 rule. It’s a best practice suggested by the United States Computer Emergency Readiness Team for all computer users who want their data secure and protected (and we think that’s all of us!). Here’s how it works:

3: Keep three copies of any important file—one primary and two backups.

2: Store the files on two different media types to protect your data against various types of hazards.

1: Be sure to store one copy of your data offsite.

If you’re looking to up your security game, make sure you and your team are aware of these 5 security threats.
 

Apple Activation Lock

For anyone who has ever had their Apple tech lost or stolen, Activation Lock sounds like a dream come true. When setting up your Find My, Activation Lock turns on automatically, preventing anyone else from grabbing your device, wiping it, and reactivating it for themselves. Where this starts turning into a nightmare, however, is when trying to offload these devices in private sales. Without the original Apple ID and password, the devices may as well be bricked, and thousands could wind up being scrapped or landfilled.

Here are a few best practices to remember:
  1. For work-managed devices, invest in a mobile device management system that can handle the deactivation of multiple devices. Ensure that staff and students aren’t using their own private Apple IDs on their devices.
  2. Check for Activation Lock before finalizing a purchase from a third party or private seller. Before finalizing your own sale, ensure that you’ve deactivated Find My/Activation Lock yourself.
  3. If you suspect you may forget your personal device password at any point, use an encrypted password-keeper app to keep your Apple ID (and the dozens of other passwords you use across the web) safe, but available.
 

SH1MMER update

Last month we talked about a Chrome OS exploit called SH1MMER. In an interesting turn of events, K12TechPro reached out to the group of students (yes, students) responsible for creating and distributing information about this exploit, which allows the user to unenroll their Chrome device from the school’s org management.

Go read their fascinating takeaways, but for the tl;dr folks with things to do, here’s an actionable summary:
  1. Students felt their privacy was invaded
  2. Students devised an ill-advised workaround
  3. It caused a bunch of problems

As K12 IT pros, and adults in charge of students in general, there are guidelines we follow to keep kids safe. FERPA, COPPA, CIPA, and more govern the policies and systems we build to accommodate digital education. But two things can be true at once, and while what these students unleashed was deeply uncool, we can still listen to the “why” behind it all.

While preserving the ins and outs of device security, take an opportunity to discuss how device monitoring keeps students safe online. You might just head off the next big exploit reaction from teens feeling stifled by rules (but if not, you tried).
 

Malware of the month

Everyone’s favorite AI is making malware.

With the massive surge in popularity that OpenAI’s ChatGPT has been seeing over the past few months, questionable uses for the AI bot have been cropping up just as fast. Security researchers at an identity protection firm were able to get functional malware code by using ChatGPT’s API and demanding that the bot provide specific answers to requests that would normally get rejected by the content filter. Not only that, but if a target was able to set up defenses against the malware, additional commands to ChatGPT could create different mutations of the code to bypass security measures as many times as needed.


 


Thinking about edtech for your district?
We'd love to help. Visit skyward.com/get-started to learn more.

Share this story
About the author
Skyward IT Services
Network and Infrastructure Security Specialists


Read more from Skyward

Technology Tips: April 2025 Edition

Prevention is the best cure! Learn about mobile malware types, see how your Safari browser is keeping you safe, and watch out for phony texts! Plus, don't miss the malware of the month.

April 10, 2025 • Tips
A Day in the Life: Manager of Information Systems

Managers of information systems are committed to the technological success of their schools. What does a day in their lives entail?

November 24, 2019 • District Stories
Partner Guest Post: Lightning-Fast Procurement Thanks to Amazon Business Integration

Did you know Amazon Business e-Procurement technology is fully integrated into Skyward's ERP? That means you can make purchases from Amazon without ever leaving Skyward!

May 14, 2024 • Tips

This site uses cookies to improve your browsing experience and to help us understand how you use our site.
To learn more about how we use this data, click here. By continuing to use this site, you are consenting to our cookie policy.