Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

How educators can secure their online learning environments

By Ning Wang
education k-12 responsive default security
January 29, 2021

When you think about cybercrime targets, your mind probably goes to some of the typical organizations; financial institutions, retailers, government agencies, etc. However, since online learning has taken hold over the past year, we’re starting to see the platforms and infrastructure designed to facilitate learning from home come under attack with increasing frequency, just like all other systems and websites. There has been a noticeable increase in cyberattacks on all systems, and online learning platforms are no exception. Whether it’s Google Classroom, Canvas, Schoology or one of the other learning management systems (LMS) that educators are using, malicious actors are finding ways (e.g. ransomware or DDOS attacks) to disrupt remote learning. Their goals are to steal personal data where possible, or in some cases, to build their names and cause fear and disruption to the society. 

With so many students across the country now using elements of online learning, it’s more important than ever for administrators to ensure the security of the platforms these students and teachers rely on.

You may be wondering – “why would cybercriminals target educational environments?”. Unfortunately, it’s the fact that so many would ask this question that makes it such an attractive target. Too many people have the point of view that, just because their platform doesn’t hold financial details or state secrets, it won’t be targeted. That’s simply not true. The fact is that all data has value to someone, and unfortunately some LMS’s will be constructed in such a way that large amounts of student data can be harvested from them. Not everyone follows security and password best practices. Cybercriminals can take advantage of human weaknesses in one place and use them in other places where they can get financial or other gains. Email addresses, real names, real addresses, phone numbers, date of birth, etc., all are valuable information for cybercriminals. They can build their database with this personal information and use them in future attacks. This is why practicing good cybersecurity habits as users and as administrators is critical for all of us for all systems we use.

 

Asking the Right Questions

Cybercriminals have various tools they use to detect easy-to-exploit vulnerabilities, like commonly found cross site scripting and SQL Injection. This is true not just for online educational systems, but for all websites. When choosing a cloud-based online education system, it is critical to conduct a thorough security analysis of the service before deciding to use it.  Ask the vendor what security measures they have taken to ensure that their applications are built securely.

Do they have a static code analyzer as part of their development process? Have they had any external parties pentest their website? What is their vulnerability disclosure and response process? Do they have MFA (Multi-Factor Authentication) implemented for user registration and login? Answers to these questions will give you some idea how important security is to the vendor, which will reflect in the security posture of their software product. At Offensive Security, for instance, our technical and security team asks vendors to fill out a detailed security questionnaire before we buy any third-party software solution so that we can assess how secure the software tool is.

In addition to security, data privacy must be a priority. This is especially true for education software, as so much personal information is collected. You’ll need to understand what data the tool collects, where the data is stored, who they share such data with, and what their data retention policy is.

 

A Security Mindset, Common Sense and Teamwork

Once you’ve selected an LMS that’s securely built with a strong data privacy policy, best practices for ensuring that the learning environment remains secure are similar to any other cloud tool. Make sure you create a strong password. Make sure you store your password securely and turn on MFA if it is available, or pick a tool that has MFA as a default option. If you notice something that is abnormal, report to your administrator and check.

At the end of the day, security is really a mindset – and that’s especially important if you’re in an industry like education where the vast majority of users don’t see themselves as potential targets. As a school administrator, you need to step back and think about your network, your setup, your users, etc. It’s important to try and get a sense how your network and systems can be hacked, what the likely ways are that your users may make a mistake that leads to a data breach. Based on that assessment, you can come up with a plan to improve the situation.

At the same time, the burden shouldn’t fall solely to administrators; it’s a group effort. Every user needs to be paranoid about security, about being hacked, and always asking whether what he/she sees and experiences seems normal. If we practice this kind of habit, educational institutions and their users can go a long way in protecting against cyberattacks. The reality is that breaches and attacks can happen to anyone. But if we do our job well, we reduce the chance of that happening, and if it does happen, we can mitigate the issue faster and better.  Unfortunately, there is no silver bullet when it comes to cybersecurity. But if you do enough of the little things well, from due diligence to encouraging a security-first mindset across your users, you’ll be putting yourself and the students relying on you in a better position to learn in a safe and secure online environment.

KEYWORDS: cyber security education security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ning Wang is the CEO of Offensive Security.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • K-12 cybersecurity

    How K-12 cybersecurity leaders can protect their schools this fall

    See More
  • solar enews

    Learning from the U.S. Military: How Solar-Powered Microgrids Can Improve Your Company’s Security

    See More
  • SEC0819-Cyber-Feat-slide1_900px

    Securing the Mainframe: How Companies can Empower Security Analysts to Protect the Backbone of Their Enterprise

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing