Menu

K-12 Education 1:1 Programs | Cybersecurity Insights #22

0 Comment

K-12 Education 1:1 Programs | Cybersecurity Insights #22


Hey, Josh here from Absolute. Schools around the country are putting computers in the hands of students. What does that mean for security and privacy? 1:1 programs help prepare the
next generation for a data-driven world. But for IT and security professionals, the promise of wonder 1:1 programs
also comes packed with hazards. First of all, many schools saw their endpoint populations grow by orders of magnitude. An IT team, once
responsible for a few hundred endpoints, are now compelled to support and secure 50, 60, or even a hundred thousand devices, without any increase in personnel… Gulp! Not only does this make
for a super-wide attack surface, but most 1:1 programs rely on special funds: bonds, earmarked budgets, etc. This makes IT teams socially responsible for every single device… because they need to keep pristine inventories to demonstrate a return-on-investment. The second conundrum is that these tens of thousands of new endpoints are now in the hands of remarkably different users: Students. 1:1 programs must calibrate devices, not just for the run-of-the-mill knowledge worker or school administrator. Think again, they now need to incorporate demands from Curriculum, EdTech, Parents, Educators, Coaches, and Counselors who all have a stake in student’s success. On one hand, K-12 IT leaders are saddled with the expectation to demonstrate ROI, the effects of the 1:1 program, and on the other hand, they need to keep tabs on security and inventory gaps in an endpoint population spawning like Demogorgons. How can you solve the riddle? The answer is to count. Quantitative analysis of
1:1 programs is just getting started. When you begin to count, device and web activity, at-home versus campus use, outcomes for academic performance, IT teams can uncover much, much more than inventories of the digital campus. Oh, and of course, we’re talking about students… which only raises the likelihood that some of these machines are going to go AWOL. Which is another place to quantify. Why does a device disappear? How long does it take to recover? Is the device actually still on campus or in the district? How many simply have been misplaced versus those that are outright thievery? As one K-12 CIO told me: “We provide quantitative detail about device use so we can get budgets approved… and the peace of mind that our 1:1 program is secure, privacy is maintained, and we’re recovering from theft.” There you have it. Super heroes maintaining visibility, relentless command, and sculpting analysis from their 1:1 programs. If you’re in a K-12 organization, it’s time to play the role of a hero uncovering what’s working, and not, to have success with your 1:1 program. Remember to Like, Subscribe, and share this. And let’s face it, 1:1 programs are still very new, so help out your peers
by sharing your experiences below. And I’ll see you next time

Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

Leave a Reply

Your email address will not be published. Required fields are marked *