Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Leadership and ManagementLogical SecuritySecurity Education & TrainingCybersecurity NewsEducation: K-12

Protecting schools in hybrid and remote learning environments

By Kayne McGladrey
school freepik
October 14, 2021

Over the past year and a half, school administrators, teachers, and IT support staff have been working in an unprecedented threat environment, wherein the pandemic and cyberattacks resulted in closures for both in-person and online schools.


School budgets have been set for the 2021/2022 school year, policies and procedures have been updated, staffing levels have been established, and security solutions have been deployed into this dynamic environment. This article considers adjustments that can be made to deployed controls so that children and school staff remain safe in both hybrid and remote learning environments.


Cyberattacks that degrade or deny the availability of learning systems are the primary technical risk to schools. As many school districts have moved their infrastructure to hosted services on the cloud, classic distributed denial of service (DDOS) attacks pose a reduced risk, as reputable cloud vendors have deployed effective mitigation technologies that benefit all their platform customers, including schools. DDOS attacks are also less likely due to the current economic incentives for threat actors. Wiper attacks, such as NotPetya, similarly lack a financial incentive for threat actors targeting schools.


As such, ransomware attacks that encrypt and potentially exfiltrate either learning systems or student data remain the top risk.

There are three best practices that security professionals supporting schools can follow to help make the school year uneventful in their district: defending user identities, patching endpoints, and running quarterly tabletop exercises.


Defending User Identities Via Multifactor Authentication

User identities are one of the most effective lines of defense in modern cybersecurity, as a compromised account can be used to steal a user’s data, as well as provide a pivot point for threat actors.


Defensive adjustments are separated by those schools that have deployed multifactor authentication (MFA) and those that have not.

Schools that are not currently using MFA for student and staff accounts are at the highest risk of account compromise, whether from automated credential stuffing attacks or credential-harvesting phishing attacks. There are just over 600 million unique passwords currently available to security researchers and threat actors. It is quite likely that one or more student or staff passwords are at risk of being compromised unless a school has previously deployed technical controls to prevent the utilization of those that have appeared in breaches.


To prevent this risk from contributing to a breach, schools should first modify the password change process for end users so that the new password supplied by the end user is checked against a list of known compromised credentials.


Next, schools should audit their password stores for accounts where the passwords in question have appeared in a prior breach and force those end users – whether they be students or staff – to change their login credentials upon their next login to the affected system.


Finally, schools should consider a quarterly exercise to re-audit their password stores, as the number of compromised passwords only continues to increase – a password that was “safe” three months ago may no longer be secure.


On the surface of things, schools that have deployed MFA appear to be at a reduced risk of compromised user identities, which ignores the unfortunate tendency of users to click-through and approve MFA requests that appear unexpectedly on their mobile devices.


Geography is an advantage that schools have when compared to modern businesses, as most individual students should be connecting from the same IP address and device daily, compared to business employees who may have multiple devices and connect from multiple locations.

As such, schools should configure MFA to prompt when users are connecting from a different location or different device. If the school’s authentication provider supports it, they should additionally block authentication attempts from outside the country, from known proxies, and Tor exit nodes.


Administrative users accessing critical school systems should always be prompted for MFA.


Patching Endpoints and Bring Your Own Device Policies

Patching endpoints is another critical line of defense, as a compromised endpoint may either be affected by ransomware or be used as a lateral movement point by threat actors.


The move to software as a service (SaaS) has generally reduced the number of software packages installed on school endpoints, which has increased the reliance on web browsers. Thankfully, the primary web browsers all provide automated and seamless updates, with a catch: the end users need to restart their browser to receive the software updates. School districts that have provided students with devices should be able to require that the device reboot periodically, such as to install software updates.


Those schools with Bring Your Own Device (BYOD) policies should consider having teachers in remote or hybrid learning environments give students time at least once a month to reboot their computers to ensure that their endpoint devices will be generally updated patched against technical attacks.


Tabletop Exercises

Finally, schools should consider a quarterly or biannual cybersecurity tabletop exercise as part of a scheduled teacher workday.


An effective tabletop exercise incorporates all parts of the organization, from the IT team to the school principal, district administrator, communications, and counsel. The intent of a tabletop is to identify and close gaps in a school’s cyber incident response procedures. Often, those gaps include how facts are distributed and understood throughout the organization and how various departments work together based on their understanding of those facts.


Testing how a school administrator will declare a breach and how that declaration may drive communication to parents and students is a worthwhile exercise, particularly when the school administrator is working with incomplete information, which is always the case with fast-moving incidents. Ideally, schools should test those organizational information flows prior to a significant incident so that they have worked through the motions as a team before an incident occurs.


A hotwash at the end of the tabletop exercise can also help schools identify process and communications improvements.


These best practices will mitigate the main cyber risks to schools in the 2021/2022 school year without requiring the deployment of new software or requiring new expenses.


Looking ahead, security and IT professionals supporting schools should plan on aligning their policies, procedures and technical controls to a cybersecurity framework appropriate to the size and complexity of their organization.


The use of a formal framework will help schools to effectively identify and mitigate gaps in security as they plan for school budget cycles.


Although the future of remote and hybrid learning is uncertain, we can expect that profit-motivated threat actors will continue to attack those schools that have not deployed effective and appropriate defenses.

KEYWORDS: cyber security k-12 security risk management school cyber security student security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kayne mcgladrey

Kayne McGladrey, IEEE Senior Member and Field CISO at Hyperproof, has 20-plus years of experience working with Fortune 500 and Global 100 companies to effectively blend information technology and management acumen to cultivate and build cybersecurity best practices.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cybersecurity-blog

    Protecting endpoints in the age of hybrid work environments

    See More
  • schools remote learning

    Schools, here’s how to stay cyber-safe in the age of remote learning

    See More
  • cyber-security-freepik1170.jpg

    Security in 2022 – Ransomware, APT groups and crypto exchanges pose key challenges

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!