1 / 34

Technology Strategies in Education

Technology Strategies in Education. Kevin Brobst. Session Topics. Cybersecurity and Its Place in Education Minimize the IT Footprint by Leveraging Hosting and other Cloud Services. Cybersecurity and Its Place in Education. Cybersecurity – Why?.

oya
Télécharger la présentation

Technology Strategies in Education

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Technology Strategies in Education Kevin Brobst

  2. Session Topics • Cybersecurity and Its Place in Education • Minimize the IT Footprint by Leveraging Hosting and other Cloud Services

  3. Cybersecurity and Its Place in Education

  4. Cybersecurity – Why? • Awareness is NOT just imparting of knowledge. Knowledge is important, but it needs to be combined with a culture and behaviors that serve to protect your information assets. • Understand – there is no “catch all” cybersecurity defense plan that works for all organizations – but that doesn’t mean you simply ignore security. Being aware means you understand what the threats are and you know the right steps to take to prevent a compromise to data.

  5. Cybersecurity - Awareness Cybersecurity Awareness is about Knowing and Doing • Understanding the threat landscape • How to create your “Human Firewall”

  6. Why do Educators and School Administrators need Security Awareness Training? • Must protect the district’s sensitive data, including student and staff PII • Educate and train its faculty and administration on the danger of phishing schemes • Must ensure adherence to The Family Educational Rights and Privacy Act

  7. Challenges faced by K-12 • Industry experts rate schools less robust in security architecture than other organizations – making them easier targets. • Districts reliance on the Internet • While professional consortiums raise the awareness of security, unfortunately educational tech departments are often not aggressively staffed nor have the appropriate budget and resources

  8. Impact of Cybercrime • Damage and destruction of data • Lost productivity • Theft of personal data • Theft of intellectual property • Post incident disruption to the normal course of operations • Outside costs for forensic investigation • Reputational impact in the community • Restoration costs to get back to “normal”

  9. Cybersecurity Awareness • Privacy and security are issues society struggles with on a daily basis, both in our private lives and work lives. • It’s no longer a question of if, but when, an organization will fall victim to a cyberattack. • Your goal should be to create a risk aware culture and put the proper measures in place to mitigate damages from a breach. • Security awareness is knowledge combined with attitudes and behaviors that serve to protect our information assets.

  10. Cybersecurity Awareness People are a critical layer within the fabric of our Security Programs

  11. Cybersecurity Awareness • Users are unaware of the internet dangers and get tricked by social engineering to click on a malicious link in a (spear)phishing email or opening an email attachment they didn’t ask for. • Employees have a false sense of security and believe their anti-virus has them covered. With the firehose of spam and malicious email that attack your network, 10-15% make it past your filters. • Surprisingly often, backups turn out not to work or it takes days to restore a system. • Today, an essential, additional security layer is to have your employees become part of your last line of defense.

  12. Cybersecurity Awareness • In order to create a security culture and change the behavior of your employees, you have to train everyone, from the board room to lunchroom. • This should be on-demand, interactive, engaging and create a thorough understanding of how cybercriminals operate. • Employees need to understand the mechanisms • Spam • (Spear) Phishing • Malware • Ransomware • Social Engineering And be able to apply to their day to day jobs.

  13. Cybersecurity Awareness How Can You Protect Your District? The answer is defense-in-depth, and pay specific attention to the outer layer with is the weakest link in IT security: the human

  14. What is Security Awareness Training Security Awareness Training is the process of educating employees on proper information security best practices, policies, and general guidelines. • Teach users to protect themselves and your organization • Educate on the ramifications and repercussions from a security breach • Protect the assets, your name, and your image should be core objectives justifying the program • Program can be fun too

  15. Cybersecurity Awareness How does the training process work ? Baseline Testing Train Your Users Phish Your Users See the results

  16. Return on Investment • Payback is almost immediate as your biggest risk factor is people

  17. For a demo or to receive a recording please contact Kevin Brobst, Sales Manager, Education Solutions Division kbrobst@hammer.net 800-437-7956, ext. 4027

  18. Minimize the IT Footprint by Leveraging Hosting and other Cloud Services

  19. AlioCloud – Cloud Services • Defined • Types of Services • Benefits

  20. Cloud Services – What is it? • Metaphor for the Internet – in essence, a network of networks providing remote access to a set of decentralized IT resources • Accessing applications and data on someone else’s infrastructure via the web

  21. AlioCloud – Cloud Services Cloud Enablement Properties • Scalability • Availability • Manageability • Performance

  22. AlioCloud – Why? • Why Managed Hosting? • Experience • Consumption Models • Expertise • Relationship & Stability • Lower Operating Costs • Diversified Skilled Resources • Server / Network monitoring • Support all the time • Backups

  23. AlioCloud – The Benefits • Benefits • Reduce Risk with 24/7/365 monitoring and 99.985% uptime reliability • Free up internal IT for higher yielding activities • Predictable Cost Model • Scalability It’s like getting a new car warranty with maintenance services and oil changes included!

  24. AlioCloud – The Benefits • Benefits • A team of technical resources you get to know • Assurances that you get access to the capabilities you need to run your operation • Intimate familiarity with the requirements of the outsourced applications

  25. AlioCloud – The Benefits • Benefits • Systems management gets high attention using best practice disciplines • Support remote accessibility for work force – increase productivity • A eye on manufacturer updates, especially security, that need to apply • Software updates

  26. AlioCloud – The Benefits • Benefits • Enterprise level backup and recovery • Datacenters that feature multiple redundancy features that ensure storage, network connectivity, and no single point of failure • Achieve higher levels of security and compliance from the provider – so you don’t have to

  27. AlioCloud – The Benefits • Benefits • Architected for resilience and availability • Customized Options • Life cycle changes come with a learning curve – you can avoid

  28. AlioCloud – Cloud Services AlioCloud • Delivered from Cloud Compliant US data centers • Architected for Alioclients specifically – shared compute but dedicated web instances for security / control • Fault tolerant architecture • Skilled and knowledgeable technical support team • Application features are the same as on premise

  29. AlioProtect– Cloud Services AlioProtect • Creative use of the Cloud beats traditional Disaster Recovery plans. • Eliminate recovery site commitments • Access recovery only if needed • Easy, affordable, and scalable as requirements change

  30. AlioProtect– Cloud Services AlioProtect • Managed by the same AlioManaged Services team • Secure replication tunnels with built in WAN acceleration • Install backup server on sight and point to the AlioProtectcloud • Can be used for other applications, file systems, and databases – not just for Alio • Full and partial recovery options

  31. Wednesday Evening Balboa Island Expedition • Shuttles will load in front of hotel starting at 5:30pm and run every 20 minutes. • You will receive an envelope when loading the shuttle with evening event info. • HarborsideRestaurant has light fare available throughout the evening. • Cash bar available • You will need to be on the ferry by 8:15pm to catch the last shuttle to the hotel • The last shuttle to the hotel leaves at 8:30pm. • Should you decide to enjoy what Balboa has to offer beyond 8:15pm you will need to arrange transportation back to the hotel such as Uber or Lyft. • If you complete your Scavenger Hunt, take it back to the Alio Summit Registration Desk at the hotel by 9:00pm to receive a prize. • Bring a sweater or jacket in case it becomes chilly.

  32. Additional Training

More Related