Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceIdentity ManagementPhysical SecurityCybersecurity NewsCyber Case StudiesEducation: K-12

Cybersecurity at Val Verde ISD

How does the team at the Val Verde ISD protect the data of its students, faculty and staff?

SEC0320-val-feat-slide1_900px.jpg
SEC0320-val-slide2_900px.jpg

The mission of Val Verde Unified School District is to provide academic environments that produce life-long learners who become responsible and contributing citizens in a culturally diverse society.

Photo courtesy of the Val Verde Unified School District

SEC0320-val-feat-slide1_900px.jpg
SEC0320-val-slide2_900px.jpg
March 11, 2020

When it comes to cybersecurity, criminals know no boundaries. And that includes schools.

For example, St. Landry Parish needs $160,000 for cybersecurity after hackers implanted a computer virus in the district’s computer system. In Naperville, Ill., the personal information of nearly 53,000 students and 3,100 educators in Naperville District 203 and Indian Prairie District 204 was exposed following a data breach at a company that handles the districts’ K-8 academic assessments. And in Bethlehem, Pa., hackers accessed the names, birth dates and email addresses of 2,168 students in the Bethlehem Central School District.

A new cybersecurity incident strikes a school district approximately every three days, according to The State of K-12 Cybersecurity: 2018 in Review. Released by the K-12 Cybersecurity Resource Center, the report cited 122 incidents in 2018 that resulted in the theft of millions of taxpayer dollars, stolen identities, tax fraud and altered school records. “Public schools are increasingly relying on technology for teaching, learning and school operations,” said Douglas A. Levin, president of EdTech Strategies and report author. “It should hardly be surprising, therefore, that they are experiencing the same types of data breaches and cybersecurity incidents that have plagued even the most advanced and well-resourced corporations and government agencies.”

Part of the reason, says the report, is that while the basic structure of elementary and secondary schools remains recognizable, one of the most significant ways schools have changed from the past has been via the massive infusion of technology. In fact, U.S. K-12 schools are increasingly reliant on technology and sophisticated IT systems for teaching, learning and school operations.

The number of U.S. K-12 students with access to the broadband they need for ‘digital learning’ in schools and classrooms grew from 4 million in 2013 to 44.7 million in 2018, according to the report. Millions of mobile PCs – notebooks/Macs, netbooks, tablets and Chromebooks – are being purchased by U.S. K-12 schools every year, with the penetration of mobile PC devices used by U.S. teachers and students now above 50 percent. School telephone systems are migrating to VoIP services; point-of-sale systems are deployed in school cafeterias; HVAC and lighting controls are centrally managed via IP networks; student information systems offer real-time insights to administrators, teachers and parents; Internet-connected surveillance cameras are being deployed in the name of school safety; and school district human resource offices manage hiring, payroll and benefits via online portals. While uneven, the scope and speed of technology adoption by U.S. K-12 schools has been remarkable, the report notes.

“The country’s K-12 information-technology leaders are likely underestimating the dangers they face. Most don’t see cybersecurity threats such as ransomware attacks, phishing schemes and data breaches as a significant problem. Even more troubling, many school technology leaders are failing to take basic steps to secure their networks and data,” the report says. Some states and schools are leading the way in this area. For example, under Texas Senate Bill 820, school districts are required to craft a cybersecurity policy to “secure cyberinfrastructure.” Districts must also perform risk assessments and “implement mitigation planning.” Superintendents will designate a cybersecurity coordinator as a liaison between the district and the state and parents.

Even more, Texas House Bill 3834 requires certain state and local government employees and state contractors to complete a cybersecurity training program certified by the Texas Department of Information Resources. Texas school staff and even school board members fall under that category because of their access to sensitive data.

 

Val Verde USD

No school district wants to become a victim of a cyberattack, so Val Verde USD proactively sought to increase its data protection.

Val Verde Unified School District (USD) provides students with a world-class education to ensure they are ready to assume their roles in the 21st century workforce. Located in Perris, Calif., the district serves 20,000 students in 23 schools and employs 1,800 teachers and staff. The district had four requirements for data backup: integration with primary storage, which is Nimble Storage from Hewlett Packard Enterprise (HPE), faster recovery, tape support and backup to the cloud.

“It’s our job to support the district’s mission through the use of technology,” says Matt Penner, director of information and instructional technology, Val Verde USD. “We don’t simply train students on how to operate technology – we also teach them how to use it as a resource to further their educations and careers. To accomplish this, our data must be backed up and protected at all times, especially if we experience a catastrophic event such as an equipment failure or a cybersecurity incident.”

No school district wants to become a victim of a cyberattack, so Val Verde USD proactively sought to increase its data protection. The most critical data is in a student management system called Aeries. It contains students’ grades, test scores, attendance records and more. The district’s business data is critical as well. It includes financial, HR and payroll – everything that enables the district to operate smoothly.

“Recovery with legacy backup was horrendously slow, taking an average of three hours for a single file,” Penner says. “When recovery takes that long, it makes you question whether getting data back is worth it, and that’s not a position you want to be in. You certainly don’t want to ask the superintendent how badly he needs a file recovered.”

Penner says legacy backup was also difficult to use. “We spent an hour each day on management and maintenance, so combined with slow recovery, legacy backup was consuming eight hours each week. Like most school districts, we have a small IT team, so every minute counts.”

He understood that he would need to engage a partner with expertise updating a legacy backup system. Val Verde USD contacted several resellers for advice. One stood out among the rest: Logicalis, a global provider of digital enablement solutions.

 

The Solution

Val Verde USD is using the Logicalis Veeam® Availability Suite and has seen significant results in terms of time savings, ease of use and more. “We replaced a legacy backup with Veeam and it significantly improved our ability to protect data,” Penner says. “Recovery speed increased by 98 percent, so if we find ourselves in a catastrophic situation, we know we’ll be able to recover quickly, avoid data loss and operate as normally as possible.”

“It’s amazing how quickly the solution restores data,” adds Brian Falk, Network Services Manager, Val Verde USD. “Rather than asking someone how badly they need us to restore something, we ask, ‘How fast do you need it? No problem!’ We have full confidence in our ability to do our jobs, and we’re able to do our jobs faster. We save eight hours each week because the solution is fast, simple and easy to use.”

The solution is storage-neutral and integrates deeply with many storage providers, It backs up 30 TB across 100 VMware vSphere virtual machines (VMs) from Nimble Storage Snapshots on-premises for fast recovery. Nimble replicates VMs off-premises for disaster recovery (DR).

The solution also allows the IT team to create isolated environments for testing software updates before deploying them in production. “Sandboxing is a big benefit for us,” Falk says. “When our engineers want to test something in Active Directory, we build them isolated environments, giving them full range to completely destroy Active Directory if they need to because we know we can restore it fast.”

Even more the solution provides fast and secure backup, replication and direct restore to the cloud. Val Verde hasn’t chosen a cloud yet, but the solution can leverage any public cloud provider, including AWS, Microsoft Azure and IBM Cloud, or a managed service provider.

“One of the things we like best about the solution is that it can protect all workloads – virtual, physical and cloud – from a single management console,” Falk says. “But we also appreciate that it supports tape backup, which was another requirement. A lot of resellers pushed us away from tape, but they understood our reasoning: It’s additional security for cyberattacks, particularly in the case of ransomware. Tape is our second media in the 3-2-1 backup rule.”

KEYWORDS: cyber security cybersecurity data breaches physical security school security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0320-profile-feat-slide1_900px.jpg

    Safety and Security - Top Priority at Fort Worth, Texas ISD

    See More
  • email

    Phishing Scam Cost Manor, Texas ISD $2.3 Million

    See More
  • Jeffrey Millslagle

    Tyler ISD Names New Director of Safety & Security

    See More

Related Products

See More Products
  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×
The mission of Val Verde Unified School District is to provide academic environments that produce life-long learners who become responsible and contributing citizens in a culturally diverse society. Photo courtesy of the Val Verde Unified School District

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!