NIST Cybersecurity Recover Function for K-12
The Recover Function gets things back to normal as quickly as possible If you’ve been following our series about the NIST Cybersecurity Framework, you know that many K-12 districts are finding the Framework a useful tool for developing a multi-layered cybersecurity strategy. It’s no secret that K-12 cybersecurity issues are ... Read More
How To Get Started With The NIST Cybersecurity Respond Function
The Respond Function creates a roadmap for managing a cybersecurity incident Virtually every district across the country is working hard to address cybersecurity for K12 schools. It’s a critical issue, especially because hackers take advantage of crises like the COVID-19 pandemic. And because the pandemic has forced districts to transition ... Read More
NIST Cybersecurity Detect Function for K-12
The Detect Function is critical because you’ll never be able to stop 100% of cybersecurity attacks K-12 cybersecurity is a critical issue for every school district. This is the third installment of a series based on our interview with Neal Richardson, the Director of IT at Hillsboro-Deering School District in ... Read More
NIST Cybersecurity Protect Function for K-12
The Protect Function brings your district closer to better cybersecurity and data privacy compliance One of the most critical issues facing K-12 IT leaders is cybersecurity. The importance of addressing cybersecurity has risen significantly because cybercriminals are increasing their attacks on K-12 systems, and hackers are taking advantage of the ... Read More
Customer Story | Northwest Tri-County Intermediate Unit 5 Secures Google Workspace & Microsoft 365
Pennsylvania Regional Educational Service IT Team Finds Value In Cloud Security Platform Build for K-12 Northwest Tri-County Intermediate Unit 5 (IU5) is a regional educational service agency based in Edinboro, PA. With a staff of about 11, they provide programs and services for 17 public school districts and the non-public ... Read More
NIST Cybersecurity Identify Function for K-12
The NIST Cybersecurity Framework can guide overworked K-12 IT teams The NIST Cybersecurity Identify Function is the first step when you decide to use the NIST Cybersecurity Framework. The National Institute of Standards and Technology (NIST) developed this Framework as part of its mission to provide best practices for several ... Read More
Gadsden County Public Schools Secures Google Workspace for Education with ManagedMethods
Florida School District Thwarts Phishing and Unauthorized Account Access Attacks Gadsden County Public Schools is a K-12 district located northwest of Tallahassee, Florida. The IT department of three staff members supports the technology infrastructure and security needs of about 4,500 students and over 850 employees. Stephen Gauss is the Systems ... Read More
Getting Started with a K-12 NIST Cybersecurity Framework
School districts are finding the NIST Cybersecurity Framework a useful way to manage cybersecurity The National Institute of Standards and Technology (NIST) works closely with industry, government agencies, and scientists around the globe to set standards that allow critical technologies to work together. NIST first released the NIST Cybersecurity Framework ... Read More
Zero Trust Cybersecurity for K-12 School Districts
Zero trust cybersecurity is a never trust, always verify approach that K-12 districts need now more than ever For many years, school districts relied on network perimeter cybersecurity such as firewalls and web content filters to protect their systems against cyberattacks. Today, perimeter-based cybersecurity is dead. It was before COVID-19 ... Read More
How Cybersecurity and Cyberbullying are Intertwined in K-12 Schools
Cybersecurity and cyberbullying are uniquely related in K-12 online learning systems One of the many unique themes of K-12 cybersecurity, compared to other industries, is how closely it is tied to cyber safety. One example of this relationship is that between cybersecurity and cyberbullying. While, on the surface, they are ... Read More

