Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingFire & Life SafetyPhysical Security

Education & Training

Cybersecurity lessons learned in the K-12 sector

By Mary Jane Warden, Maria Stavropoulos
education-training
October 15, 2021

When It Happens to You: Network Attacks

By Mary Jane Warden, Contributing writer

In the spring of 2019, my school district experienced intermittent network disruptions over three weeks, with issues more concentrated during that last week. Unfortunately, that last week also happened to be the week our district was administering benchmark assessment tests to students.

The district’s network administrator worked with our internet service provider (ISP), and through a close review and analysis of the network traffic data and logs, it was determined that our district was under a distributed denial-of-service (DDoS) attack, which is a malicious attempt to disrupt normal traffic to a web property.

As investigations of the network issues continued, we analyzed the online activity as captured by our content filter of several students that had been suspected of online mischief in the recent past. We discovered that the online activity — websites visited and Google searches conducted — matched the district’s internet service outages. Each time a DDoS attack happened during the school day, it coincided with the student conducting a Google search with the keywords “What is my IP.” Through further discovery, we found that the attacks were coming from a server in Belize and that the student’s past Google searches connected the student to this particular company that would be paid to enact DDoS attacks on a provided public IP address.

After this experience, our network team reflected on incident response. We concluded that it was time for the district to invest time and energy in determining risks to our systems to build protection and develop incident response checklists to assist with investigations.

Furthermore, our team felt the deep need to conduct drills for essential areas like disaster recovery.

As the technology department director, I turned to professional organizations like the Consortium for School Networking and our local chapter of the Illinois Educational Technology Leadership Association to research industry practices and access cybersecurity self-assessments or other template data security plans that districts could use to build solid approaches to cybersecurity.

Cybersecurity and data protection has been the recent focus of many school districts among our cohort and across the nation. It especially hit close to home when nearby districts endured ransomware attacks or were targets of spear-phishing. With situations like the one our district experienced or reading news about other organizations and companies living through these attacks, the landscape has changed from mere awareness of these types of incidents to developing action plans to protect valuable network resources and services.

The technology ecosystem has become our lifeblood in education. As leaders in our organizations, we feel responsible for ensuring that proper steps are taken to mitigate security compromises and practice a higher level of prevention.




Designing the Security Roadmap for Schools

By Maria Stavropoulos, Contributing writer

After accessing our current state of cybersecurity, identifying areas for improvement and vulnerabilities, we built a roadmap for our next steps. We discovered that we needed to further secure our infrastructure beyond firewalls as a small district with entry-level support staff. For this reason, we proceeded to partner with a managed service provider (MSP), EMPIST. The MSP provides us 24/7 year-round monitoring and maintenance to support our team. Additionally, the MSP can eliminate any cybersecurity or lagging threats before they harm our business environment by leveraging tools to monitor and detect irregular behaviors and mitigate them.

With some peace of mind, we were able to work with our MSP to define our roadmap further. Using the National Institute of Standards and Technology (NIST) Framework and completing CoSN’s Peer Review, we were able to gain insights into our strengths and areas for growth. In our initial stages, we accessed our network and systems to identify any immediate needs and vulnerabilities. Upon identifying these vulnerabilities, we prioritized our work for a flexible architecture to support the changing educational environment. Next, we proceeded with the consolidation of servers and switches. We then worked to consolidate backups and secure these both internally and externally. Finally, we looked to reconfigure the network and virtual local area networks (VLANs) for better access and visibility at all sites.  

In the second phase of our security roadmap, we anticipate installing endpoint antivirus and identifying user access vulnerabilities. Once these vulnerabilities are identified, we will work to create access charts for these systems and applications. We are also planning to optimize our operations by implementing management tools that provide full access and control of the network and end-user devices. Such tools will also provide real-time analytics to our systems.

In the third phase of our roadmap, we will focus our efforts on responding to vulnerabilities and intrusions by verifying our cybersecurity insurance coverage, requirements, and compliance with policies and regulations.

While these are items we continuously review and reflect upon, we will more closely examine the policies during this phase. For instance, one of the areas we plan to focus on is documenting and formalizing an incident response plan with templates in the event that we experience an intrusion and need to take action. We will also further identify the data we collect and store it during this stage, including any recovery data. With these items in place, we would recover from a breach with minimal data loss and anticipate a significant reduction in downtime.




Security Awareness: A Key Mitigation Strategy for Schools

By Maria Stavropoulos, Contributing writer

Beyond properly equipping our staff responsible for cybersecurity, we must not forget to bring awareness of our security roadmap and the steps we are taking to mitigate risk to employees and vendors across the entire organization. Awareness about data privacy policies, compliance with regulations and knowledge of the threats that target end-users are critical components to deepen everyone’s understanding of countering cyberattacks.

At our district, we support this need to communicate such information with employees through committee work, newsletters and annual training to all staff. A tool we utilize for our routine training and phishing campaigns is KnowBe4. Through KnowBe4’s campaigns, we provide security awareness training to help reduce security problems of social engineering, spear-phishing and ransomware attacks.  

Our roadmap does not end yet. Instead, we cycle back to the beginning, re-audit our systems and make adjustments as vulnerabilities and systems progress and age with time. The process is evolving as we continually seek to pivot in a constantly changing world of technology. As school leaders in the IT world, we must have the mindset that it is acceptable to seek support in sharing our experiences, growing our workforce and securing our systems and data from the unexpected. We are also not just in the business of security, but also in educating a digital citizenry and in navigating the wild frontier of cybersecurity for our school districts.




Rethinking Cybersecurity Staffing Within the School District

By Mary Jane Warden, Contributing writer 

The priority of school districts has always been on the teaching staff, and rightfully so. The majority of school district staffing and budgets are concentrated on educators, administrators and support staff that tie directly into the activities of the classroom. For a long time, a school district technology department could be barebones where individual IT staff could wear many different hats. As the internet and the digital world have grown, so has the complexity of supporting online environments and keeping them secure.

Over the last decade or so, there has been a realization that with our growing dependence on technology to do the things we do in education, there is also an increased demand for skilled and talented IT professionals to support the network infrastructure and online operations. Layered into this is the expanding concern regarding data privacy and cybersecurity. As a result, it is imperative that school leadership seriously consider investing budgets into staffing technology departments appropriately with increased technical skills in specialty areas like cybersecurity. But with non-profit wallets, this is a challenge that weighs heavy on the minds of school leadership trying to compete with corporate job markets that have deeper financial pockets.

Oftentimes, IT positions in school districts provide entry to those seeking to build their technical skills and experience. Thus, IT professionals can get their feet wet in applying what they have learned in the sterile setting of a classroom to the realities of a living and breathing IT infrastructure and dynamic user encounters. However, a school district’s ongoing challenge is retaining those IT professionals that the district has poured time, energy and resources into within a generally flat organizational chart. Therefore, the phenomenon that occurs is that IT professionals then find their career next steps by moving to a fellow district.

While this is the overarching movement in the education job market for IT professionals, school leadership can look to professional organizations to grow an IT and cybersecurity workforce as a collective rather than competing in silos with each district fending for themselves. When professional organizations organize training and collegial discussions amongst job-alikes making the “smartest in the room” the room itself, this can grow an IT workforce across school districts rather than keeping the burden of retention on individual districts. This process should then minimize the negative impact of IT professionals moving from district to district.

Even beyond nurturing a robust workforce, there still is an optimism to be upheld as school districts seek out IT professionals from the industry at large with straining budgets. President Kennedy famously said, “Ask not what your country can do for you, but what you can do for your country.” In my years as technology director, I would have to say that what the field of education can offer an IT professional is a sense of personal fulfillment in giving back to our communities. This value is not assessed in dollars, but in the betterment of others and an investment into the future through the education of our students.

KEYWORDS: business continuity corporate security risk assessment risk management workplace culture

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

As a Director of Technology, Mary Jane Warden currently leads a team of 33 members in a technology services department that supports innovation and instructional technology in Park Ridge-Niles District 64 in Illinois. Warden has been in education for 26 years, serving over the decades as a middle school social studies/language arts teacher, staff developer, and district-level technology director in Illinois. She found her inner geek when the internet first hit the scene back in 1994 and, through a state grant brought, an ISDN line to her school. Her energies since then have been invested in building technology tools and infrastructure in supporting students and teachers in teaching and learning in a digital age. She has presented at local and national conferences as an educator, technologist and instructional coach. Image courtesy of Warden

Author1

As an experienced Director of Technology, Maria Stavropoulos is passionate about exploring, educating, and implementing current methods with staff and students for a better educational environment. She actively seeks ways to enhance and grow the district’s infrastructure and technology processes to support education’s environmental and instructional changes. Stavropoulos also has a passion for maintaining data and privacy standards while educating those within the organization. Her consistent vision and follow-through have established a solid foundation for the district’s technology implementation. Image courtesy of Stavropoulos

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • data-law-freepik1170x658.jpg

    Lessons learned in the five years since the Equifax data breach

    See More
  • The Cyber 101 Discussion

    Navigating the Unknown: Lessons Learned in the Full-Scale Transition to Remote Work

    See More
  • masks in public

    COVID-19 lessons learned in enterprise security

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!