Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityEducation: K-12Education:University

Secure remote access: Considerations for K-12 and universities

By Karen Gondoly
k-12 cybersecurity considerations to protect data and secure remote access in the education sector
June 28, 2021

There’s hardly a business in the world that hasn’t faced challenges with remote work during the pandemic, but the issues that universities and K-12 districts have faced have been unique. With students and teachers requiring access to resources for academic continuity, schools have also needed to examine their security practices for remote access. According to a recent report, 2020 was a “record-breaking” year for cybersecurity issues at the K-12 level, with many incidents leading to school closures, millions of dollars in stolen taxpayer money and student data breaches linked to identity theft and credit fraud. Colleges and universities experienced a similar spike, with ransomware attacks doubling from 2019 to 2020 – all while schools report a potential cut to IT budgets.

The result is a wakeup call for the education sector: it’s time to be more targeted and efficient about secure remote access to school resources while also continuing to provide connections to the tools and software that universities and K-12 districts have invested in and that are critical for students to utilize. The security challenges involved with remote student access, coupled with a need for a user-friendly solution that allows students, faculty and staff to utilize resources when off campus, mean that school and university IT departments must consider a number of elements when evaluating the security of their remote access solutions.

Conserve resources through pooled desktops and policies

Where some organizations can provide one-to-one access to remote desktops, students and faculty are more likely to need different resources depending on the class they are in. Software, particularly for students in art, design and engineering programs, is expensive to license, and often too resource-intensive to run on a personal computer.

By finding a solution that allows for pooling desktops and allocating machines based on policies, schools are able to make resources available to students dynamically. The goal is to define policies to help better utilize the resources. For example, if a desktop goes idle, it times out and is released back to the pool for another student to use. This is both more efficient and more secure when you consider the centralized control and monitoring associated with managing dynamic pools of desktops.

Ensure that log-in is user-friendly...

Many remote access solutions rely on VPN, but this can be costly, resource-intensive, and cumbersome for the end user. When managing a user base consisting of thousands of different people, it’s essential to ensure that it’s easy for each person to log in remotely through a sleek, simplified interface. Evaluate any solution not just from the IT side, but also from the user side. Think about the potential problems that can come up – and the drain they could turn into for your help desk – before making a decision regarding the login workflow.

Secure with multi-factor authentication and Zero Trust support

The hard work of security can take place out of sight for the user, with multi-factor authentication and Zero Trust support. Ensure any solution you are bringing on has this type of security integrated so it does not become a headache down the road. Audit-level tracking is another way to ensure security. This allows you to always know who’s using what from where and for how long, so you can monitor trends in user behavior and look for outliers that may indicate a security breach.

Provide multiple levels of access

In a large organization like a school district or university, it’s important to support tiered access controls. Look for solutions that allow you to assign role-based access to the tools that manage your remote access environment. For example, your tech support help desk might be able to access some features, but the IT administrators have full control. This helps to limit the potential security risks, even when a large number of IT employees are managing the system.

Consider student onboarding

For both ease of use and security, you’ll want to ensure that student onboarding is as simplified as possible. Many universities continue to manually onboard students, but you can also integrate with directory sources like Active Directory in order to give students access to the proper resources automatically. By ensuring that students only access the resources they need, you increase the overall security of your organization.

Support a wide array of devices

Schools, colleges and universities are unique in the sense that students often bring their own devices, unlike what they might do with an employer – and your security needs to adapt to all of them. Ensure that whatever remote access solution you choose enables students to choose between a Mac and a PC while maintaining security and accessibility standards. Take into consideration solutions that require students to install software on their devices or that allow students to redirect USB devices to their hosted resource. These aspects present both maintenance and security challenges for IT administrators.

In fact, flexibility will be key in making choices for remote access, because technology will continue to change and it’s essential that your remote access solution does not limit your ability to switch to newer and possibly more affordable options in the future.

 

KEYWORDS: data protection education security k-12 security school cyber security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Karen Gondoly is CEO of Leostream, a vendor agnostic platform providing a comprehensive and scalable solution for organizations to securely deliver and manage remote access to physical and virtual machines hosted on-premises and in cloud environments.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • school communication

    Emergency communications: Considerations for K-12

    See More
  • 3m-k12

    Universities, K-12 Schools installing 3M™ Safety & Security Film Inside and Out

    See More
  • Mike Matranga launches M6 Global Defense

    Mike Matranga launches M6 Global to serve K-12 communities, universities, corporate environments, etc.

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing