K12 Tech Leader InfoSec Survey Results

What can we infer?

The results are in from a recent K12 security survey conducted by Frontline Education (see here). 

The survey spun off of another recent survey, conducted by the Consortium for School Networking (CoSN), which revealed that cyber security had moved into the top spot amongst current K-12 IT leadership concerns.

And with good reason.

Education cyber-attacks have been on the rise in the US in recent years. Phishing, poor data management, external hackers, internal bad actors, even cyber advisories… with so many avenues to exploit, it’s only a matter of time until someone takes advantage. Unfortunately, schools are often viewed as “soft targets,” due largely to outdated or ineffective security programs.

Cyber security was ranked as the #1 concern for K-12 IT leaders. The solution? Putting a rock-solid plan in place. #edtech #cybersecurityClick To Tweet

According to Ed Tech Strategies’ K-12 Cyber Incident Map, 67 reported incidents of cyber infiltration occurred during the 2016 school year, while 74 incidents occurred just in the first five months of 2017. Experts believe these numbers will continue to rise.

The Solution: Develop a Plan to Manage Cyber Risk

So, what’s the solution?

It’s all about having a plan. In fact, the K-12 IT leaders in our survey identified “no clearly defined plan” as the biggest obstacle in managing cyber risk.

What do you believe is your district’s biggest obstacle in managing cyber risk?
districts k12 cyber security and privacy posture
districts k12 cyber security and privacy posture

Internet blacklisting, endpoint protection, network access control and role-based access control are all good short-term fixes, but do they strike at the heart of the problem? What’s needed isn’t a quick fix, but a plan and processes in place that will ensure your data remains secure, no matter who might come knocking.

We’ve done some of the legwork for you. To learn more about building the best cyber security plan for your district, check out our Cyber Security Program Getting Started Guide.

Leave a Reply

Your email address will not be published. Required fields are marked *

Scroll to top
error: Content is protected !!