Lessons from COVID-19: Embracing Digital Transformation to Weather...
Key Technology Influences in Modern Higher Education
The New Learning Analytics Driving Individualized Learning Outcomes
Securing BYOD for Schools
Student Data Security: A Call to Arms for K-12
Jim Pulliam, CIO, Orange County Public Schools
IoT in the Education Space
Rajesh Adusumilli, CIO/Assistant Superintendent for Information Services, Arlington Public Schools
A Collaborative Partnership to Engage Students to Drive Success...
Orlando Leon, CIO, California State University, Fresno
The Evolution of the "I" in CIO
Cynthia Herrera Lindstrom, CIO, University of Illinois at Chicago
Thank you for Subscribing to CIO Applications Weekly Brief
How Cloud Threats Impact Remote Education
Because of remote learning, cloud use is fast increasing, but it has also raised new cybersecurity risks.
FREMONT, CA: With the majority of schools continuing to use remote or hybrid learning, it is evident that investing in a solid and durable IT infrastructure, such as cloud technology is a wise and required decision.In times of crisis, the cloud allows schools and districts to instantly adjust and continue learning for children on a large scale.
The cloud, on the other hand, is not without its drawbacks. As a result, administrators and educators must be even more attentive about security and privacy while using cloud-based services. In addition, to maintain online classrooms safe and secure, IT staff must adjust their cybersecurity strategies.
Some of the Cloud Computing Security Challenges in Education
Loss of visibility:
Most students and teachers now use cloud-based technologies from a variety of locations, networks, and devices. As a result, it makes it more difficult for IT departments to keep track of their users. Furthermore, because everyone is now online, location-based security and privacy assumptions are no longer as accurate as before the pandemic.
Data breaches and data loss:
The most common concern among educational institutions is the loss or leakage of student data, particularly when it comes to minors. According to the US Government Accountability Office, thousands of K–12 students' personal information gets stolen in data breaches between 2016 and 2020.
Apart from challenges from the outside, IT teams must also be aware of vulnerabilities from within their environment. Data saved in the cloud is also at risk from unintentional sharing and other human blunders. Students and educators can potentially abuse cloud services and apps by downloading illicit programs or posting sensitive information in chat rooms.
Videoconference bombing (Zoombombing):
Hackers can potentially gain access to cloud-based videoconferencing solutions. Bad actors jumping on calls to share indecent photographs, yell profanities, and so on have been frequently documented by the media. Disruptive attacks can also entail students hijacking and interrupting online classrooms on purpose.
Advanced malware and phishing:
Malware and phishing attacks, according to Manley, are becoming more sophisticated. Ransomware, for example, has progressed beyond simply encrypting data.
How can schools protect themselves against cloud-based threats?
Cloud security products that allow IT staff better visibility on how students, educators, and some other school employees use popular cloud tools are also essential.
Cloud security broker solutions can make this effort easier by allowing IT departments to monitor student and employee cloud usage. Additionally, cloud security posture management technologies assist IT teams in identifying vulnerabilities, assessing compliance risks, and more effectively managing identities and privileges.
See Also: Top Cloud Solution Companies