340 likes | 639 Views
Technology Strategies in Education. Kevin Brobst. Session Topics. Cybersecurity and Its Place in Education Minimize the IT Footprint by Leveraging Hosting and other Cloud Services. Cybersecurity and Its Place in Education. Cybersecurity – Why?.
E N D
Technology Strategies in Education Kevin Brobst
Session Topics • Cybersecurity and Its Place in Education • Minimize the IT Footprint by Leveraging Hosting and other Cloud Services
Cybersecurity – Why? • Awareness is NOT just imparting of knowledge. Knowledge is important, but it needs to be combined with a culture and behaviors that serve to protect your information assets. • Understand – there is no “catch all” cybersecurity defense plan that works for all organizations – but that doesn’t mean you simply ignore security. Being aware means you understand what the threats are and you know the right steps to take to prevent a compromise to data.
Cybersecurity - Awareness Cybersecurity Awareness is about Knowing and Doing • Understanding the threat landscape • How to create your “Human Firewall”
Why do Educators and School Administrators need Security Awareness Training? • Must protect the district’s sensitive data, including student and staff PII • Educate and train its faculty and administration on the danger of phishing schemes • Must ensure adherence to The Family Educational Rights and Privacy Act
Challenges faced by K-12 • Industry experts rate schools less robust in security architecture than other organizations – making them easier targets. • Districts reliance on the Internet • While professional consortiums raise the awareness of security, unfortunately educational tech departments are often not aggressively staffed nor have the appropriate budget and resources
Impact of Cybercrime • Damage and destruction of data • Lost productivity • Theft of personal data • Theft of intellectual property • Post incident disruption to the normal course of operations • Outside costs for forensic investigation • Reputational impact in the community • Restoration costs to get back to “normal”
Cybersecurity Awareness • Privacy and security are issues society struggles with on a daily basis, both in our private lives and work lives. • It’s no longer a question of if, but when, an organization will fall victim to a cyberattack. • Your goal should be to create a risk aware culture and put the proper measures in place to mitigate damages from a breach. • Security awareness is knowledge combined with attitudes and behaviors that serve to protect our information assets.
Cybersecurity Awareness People are a critical layer within the fabric of our Security Programs
Cybersecurity Awareness • Users are unaware of the internet dangers and get tricked by social engineering to click on a malicious link in a (spear)phishing email or opening an email attachment they didn’t ask for. • Employees have a false sense of security and believe their anti-virus has them covered. With the firehose of spam and malicious email that attack your network, 10-15% make it past your filters. • Surprisingly often, backups turn out not to work or it takes days to restore a system. • Today, an essential, additional security layer is to have your employees become part of your last line of defense.
Cybersecurity Awareness • In order to create a security culture and change the behavior of your employees, you have to train everyone, from the board room to lunchroom. • This should be on-demand, interactive, engaging and create a thorough understanding of how cybercriminals operate. • Employees need to understand the mechanisms • Spam • (Spear) Phishing • Malware • Ransomware • Social Engineering And be able to apply to their day to day jobs.
Cybersecurity Awareness How Can You Protect Your District? The answer is defense-in-depth, and pay specific attention to the outer layer with is the weakest link in IT security: the human
What is Security Awareness Training Security Awareness Training is the process of educating employees on proper information security best practices, policies, and general guidelines. • Teach users to protect themselves and your organization • Educate on the ramifications and repercussions from a security breach • Protect the assets, your name, and your image should be core objectives justifying the program • Program can be fun too
Cybersecurity Awareness How does the training process work ? Baseline Testing Train Your Users Phish Your Users See the results
Return on Investment • Payback is almost immediate as your biggest risk factor is people
For a demo or to receive a recording please contact Kevin Brobst, Sales Manager, Education Solutions Division kbrobst@hammer.net 800-437-7956, ext. 4027
Minimize the IT Footprint by Leveraging Hosting and other Cloud Services
AlioCloud – Cloud Services • Defined • Types of Services • Benefits
Cloud Services – What is it? • Metaphor for the Internet – in essence, a network of networks providing remote access to a set of decentralized IT resources • Accessing applications and data on someone else’s infrastructure via the web
AlioCloud – Cloud Services Cloud Enablement Properties • Scalability • Availability • Manageability • Performance
AlioCloud – Why? • Why Managed Hosting? • Experience • Consumption Models • Expertise • Relationship & Stability • Lower Operating Costs • Diversified Skilled Resources • Server / Network monitoring • Support all the time • Backups
AlioCloud – The Benefits • Benefits • Reduce Risk with 24/7/365 monitoring and 99.985% uptime reliability • Free up internal IT for higher yielding activities • Predictable Cost Model • Scalability It’s like getting a new car warranty with maintenance services and oil changes included!
AlioCloud – The Benefits • Benefits • A team of technical resources you get to know • Assurances that you get access to the capabilities you need to run your operation • Intimate familiarity with the requirements of the outsourced applications
AlioCloud – The Benefits • Benefits • Systems management gets high attention using best practice disciplines • Support remote accessibility for work force – increase productivity • A eye on manufacturer updates, especially security, that need to apply • Software updates
AlioCloud – The Benefits • Benefits • Enterprise level backup and recovery • Datacenters that feature multiple redundancy features that ensure storage, network connectivity, and no single point of failure • Achieve higher levels of security and compliance from the provider – so you don’t have to
AlioCloud – The Benefits • Benefits • Architected for resilience and availability • Customized Options • Life cycle changes come with a learning curve – you can avoid
AlioCloud – Cloud Services AlioCloud • Delivered from Cloud Compliant US data centers • Architected for Alioclients specifically – shared compute but dedicated web instances for security / control • Fault tolerant architecture • Skilled and knowledgeable technical support team • Application features are the same as on premise
AlioProtect– Cloud Services AlioProtect • Creative use of the Cloud beats traditional Disaster Recovery plans. • Eliminate recovery site commitments • Access recovery only if needed • Easy, affordable, and scalable as requirements change
AlioProtect– Cloud Services AlioProtect • Managed by the same AlioManaged Services team • Secure replication tunnels with built in WAN acceleration • Install backup server on sight and point to the AlioProtectcloud • Can be used for other applications, file systems, and databases – not just for Alio • Full and partial recovery options
Wednesday Evening Balboa Island Expedition • Shuttles will load in front of hotel starting at 5:30pm and run every 20 minutes. • You will receive an envelope when loading the shuttle with evening event info. • HarborsideRestaurant has light fare available throughout the evening. • Cash bar available • You will need to be on the ferry by 8:15pm to catch the last shuttle to the hotel • The last shuttle to the hotel leaves at 8:30pm. • Should you decide to enjoy what Balboa has to offer beyond 8:15pm you will need to arrange transportation back to the hotel such as Uber or Lyft. • If you complete your Scavenger Hunt, take it back to the Alio Summit Registration Desk at the hotel by 9:00pm to receive a prize. • Bring a sweater or jacket in case it becomes chilly.