Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Leadership and ManagementLogical SecurityCybersecurity NewsEducation: K-12

7 ways K-12 cybersecurity leaders can secure school data

By Madeline Lauver
School student learns on laptop
January 28, 2022

When it comes to cybersecurity, the K-12 education sector has room to grow.

According to a study on K-12 cloud security by ManagedMethods, 86% of surveyed district-level school administrators reported either using or planning to implement cloud-based student data management programs — but half of respondents did not have or were unsure if they had a cybersecurity platform in place to protect that data.

School administrators in charge of K-12 cybersecurity deal with a myriad of challenges while navigating how best to secure the data of their students and staff. Andy Lombardo, Director of Technology at Maryville City Schools in Tennessee, and Charlie Sander, CEO of ManagedMethods, discuss the current threat landscape and how school administrators and IT directors can best maintain data privacy in their communities.

Challenges of K-12 data privacy

The cybersecurity knowledge gaps in the K-12 sector present opportunities for cyberattacks on unprepared systems. "One of the main data privacy challenges K12 cybersecurity leaders face today comes down to detection," according to Lombardo. "The education industry in general is a bit further behind other industries. There are a lot of cases where data breaches and compromises are either not reported or not known, and this can threaten data privacy if not addressed."

Another challenge of securing school data is insider risk. "One of the biggest threats to data privacy are students and staff," said Sander. "Accidental data leaks are most common because of someone improperly sharing or storing sensitive documents in their school-provided cloud shared drives. It’s important that administrators protect privacy from both external and internal exposure."

How to start securing school data

Faced with knowledge gaps and cyber threats from internal and external sources, those responsible for K-12 cybersecurity should begin by assessing their organization's threat and risk levels. Lombardo recommended looking into the Cybersecurity Self-Assessment from The K-12 Cybersecurity Resource Center and the cybersecurity standards from the K-12 Security Information Exchange (K12 SIX) as a starting point for school administrators in charge of data privacy.

"Districts also need to be proactive about auditing who has access to their data — vendors included," said Lombardo. "The Student Data Privacy Consortium (SDPC) is an indispensable tool for data sharing agreements and localized student privacy resources. Getting started begins with identifying the data that is out there, who is accessing it, and what it is being used for."

Once school administrators research their current cybersecurity posture, they can tackle more specific challenges faced throughout the district. According to Sander, further steps for K-12 cybersecurity leaders include:

  1. Set up external sharing standards to prevent accidental sharing of sensitive data
  2. Require a strong password for administrative staff
  3. Enable multi-factor authentication for staff (at minimum)
  4. Require data-sharing agreements with vendors
  5. Manage the access and permissions of learning management apps used in schools
KEYWORDS: data privacy K12 security personal information protection school cyber security school security technology student safety and security threat detection

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Madeline Lauver is a former Editor in Chief at Security magazine. Within her role at Security, Lauver focused on news articles, web exclusives, features and several departments for Security’s monthly digital edition, as well as managing social media and multimedia content.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

Head in front of monitors

Ransomware Response: How Businesses Regain Control Under Pressure

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • K-12 cybersecurity

    How K-12 cybersecurity leaders can protect their schools this fall

    See More
  • school students in classroom

    Michigan door barricade bill puts K-12 schools at risk

    See More
  • education-training

    Cybersecurity lessons learned in the K-12 sector

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 150 things.jpg

    The Handbook for School Safety and Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing