One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 1768813
Date de publication 2020-06-15 11:00:00 (vue: 2020-06-15 11:07:40)
Titre Cybersecurity in education: Securing schools as they transition to online learning
Texte This blog was written by an independent guest blogger. Whether they were prepared for it or not, schools around the world have been forced to adopt an online learning model for students thanks to the COVID-19 pandemic. One of the biggest concerns educators need to have in this situation is exactly how to create a fully secure remote learning environment in order to keep sensitive information for both the schools and individual students safe from hackers. Data breaches cause real-world damage and tarnish the credibility of the organizations that fall prey to them (including schools and educational institutions). As schools across the globe turn digital due to students studying from home, they are also becoming more vulnerable targets to cyberattacks. Schools are finding themselves outmatched as these threats intensify. Parents likewise need to learn about and ensure safe cybersecurity practices for their kids, and would therefore also benefit from learning about the security methods that we are about to cover. In this article, we’ll discuss how school technology leaders can develop the necessary strategies to protect against and mitigate breaches by procuring technology and developing risk management policies and planning for incidents before they occur. Why Are Schools At Risk of Cyber Attacks? In the face of the COVID-19 pandemic, the focus and attention of most of the cybersecurity community have been on protecting government institutions, the airline industry, and the healthcare industry from hackers. This is good, but educational institutions are at just as much risk from malicious hackers as the above industries and organizations are as well. If anything, this risk has only increased significantly due to the record numbers of students who are now attending school via online learning platforms, video conferences, and e-learning environments. In the United States, the Federal Bureau of Investigation has warned extensively about the greatly increased cybersecurity risks of teleconferencing and online classrooms. The FBI specifically cites examples of malicious cybercriminals delivering threatening content to Zoom classroom calls (colloquially referred to as Zoom-bombing), which has even resulted in numerous school districts pulling out of Zoom and seeking alternative platforms. This highlights a larger issue of schools and school districts using technology that has either not been properly vetted or that educators and students are not prepared to use safely. In other words, even as school districts turn to alternative teleconferencing options besides Zoom, they can still be a major risk of falling prey to hackers and cybercriminals. This leads us to our next question: what exactly can school districts and educational inst
Envoyé Oui
Condensat ability about above access accesses accessibility accessing accounts across act activity actor administrators adopt adopt: against airline all also alternative among any anything application applications apps are around article attacks attending attention based because becomes becoming been before behind benefit benefits besides better between biggest blog blogger bombing borderline both breach breaches bureau but buy calls can cause challenge challenges choose cites classroom classrooms clients cloud colloquially come comes community companies competition compromised computing concerns conclusion conferences consider contained content control cost could cover covid create credibility critical cyber cyberattacks cybercriminal cybercriminals cybersecurity damage data defense delivering department departments designed detecting develop developing difference digital direct discuss district district’s districts domain domains download due easily education education: educational educators effective effectively either enable encrypt encrypting encryption end endpoint ensure environment environments even event exactly examples exists extensively face faced fall falling fbi federal finding firewall firewalls first focus forced fortunately from fully gain get globe good government greater greatly guest hackers happen has have healthcare help here high highlights highly hijack home how however iam identity important improve inappropriate incidents including increased independent individual individuals industries industry infected information inject institution institutions intensify investigation issue it’s itself just keep kids larger leaders leading leads leaks learn learning likewise line local longer lose low maintaining major make malicious malware managed management many may mbps measures member member’s mention mentioned methods mind minimizing mistake mitigate model monitor monitoring more most mssps much name necessary need needs network networks next not notice now nowadays number numbers numerous occur offer one online only options order organizations other otherwise out outmatched outside over pandemic parents party past person person’s place planning platform platforms policies potentially practices prepared pretty prey priorities privacy private procuring proper properly protect protecting protocols providers proxy pulling quality question: quickly rather real really record referred released remember remote reputation required resources responsible result resulted risk risks router saas sacrificed safe safely savings scalability school schools secure securing security see seeking sensitive serve servers service services sheer should significant significantly situation skills slowing smallest software solution solutions some specifically speeds staff stated states storage strategies student students studying succeed such surprise system systems takes targets tarnish technology teleconferencing than thanks them themselves then therefore these things third those threatening threats through today tools traffic transit transition truth turn unfortunately united universities upload uploading use used useless user users using utilize utilizing very vetted video view virtual visibility vpns vulnerability vulnerable warned wary ways we’ll website well what when whereas whether which who why will wise words working world worse would written zoom
Tags Malware Vulnerability Guideline
Stories Deloitte
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: