Adapting with Evolving K–12 Challenges

The last few years brought a level of technological complexity to K–12 schools that teachers, students, and administrators are still grappling with. Succeeding in those efforts requires embracing the fluid nature of an increasingly complex world. Educational leaders learned a number of lessons during the pandemic, and they have already begun to apply them to build a better future for their students and their school districts. These lessons are familiar to IT leaders in government and industry, and they include the need for stronger cybersecurity, robust data analytics for better decision-making, and a more holistic approach to IT management. As K–12 leaders absorb the lessons of the past few years, they are transforming their approach to technology and building educational systems that can thrive at a time when change is the only constant. Read the latest insights from industry thought leaders in K–12 education.

 

Gleaning Powerful Insights From Financial Data

“Today’s technology advances are directly supporting teachers and students, but school performance also benefits from improvements to back-office operations. Better budget management in particular can have a meaningful impact on a wide range of goals. The latest technologies enable schools to automate routine activities, such as processing and paying invoices. An automated system can more quickly, efficiently, and accurately capture information than humans can, but even more importantly, automation opens up the ability to adopt machine learning, which can identify important patterns and trends in spending. By freeing the finance team from mundane tasks and providing richer insights into how budgets are being used, schools can plan more effectively and ensure their money is being spent wisely.”

Read more insights from Jim McClurkin, Senior Director of Public Sector at SAP Concur.

 

Collaborating Across Districts for Cyber Resiliency

IIE THE Journal Adapting K-12 November Blog Embedded Image 2022“Taking it a step further, when schools share information with one another about the problems they are seeing and the attacks they are facing, they can crowdsource solutions and thereby boost cyber resiliency across districts and across the K–12 sector as a whole. That approach also offers a way for schools to enhance security even when funding for IT systems and staff is less than robust. Rather than leaving under-resourced districts to tackle cybersecurity in isolation, the K12 Security Information Exchange’s report concludes that ‘school districts should put a premium on sharing threat intelligence, sharing best practices, developing model policies, pursuing mutually beneficial risk mitigation solutions that can be deployed at scale, and educating state and federal policymakers about K–12 cybersecurity challenges and potential solutions.’ Pooling resources among districts can have a powerful impact, and schools can also benefit from tapping into federal security standards, many of which offer well defined processes for responding to specific scenarios and situations.”

Read more insights from Brandon Shopp, Group Vice President for Product Management at SolarWinds.

 

Innovative Tools for Protecting Students Online

“Cyberbullying in particular affects a wide range of students. The StopBullying.gov website managed by the U.S. Department of Health and Human Services states that ‘cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation.’ According to the Centers for Disease Control and Prevention, middle school students report the highest levels of cyberbullying, followed by high school students and then primary school students. In a 2020 study conducted by Justin Patchin and Sameer Hinduja of the Cyberbullying Research Center, 49.8% of tweens (9 to 12 years old) said they experienced bullying at school, and 14.5% said they experienced bullying online. For nearly 70% of the latter group, cyberbullying made them feel bad about themselves. It also had a negative effect on their friendships, physical health, and schoolwork.”

Read more insights from Colin McLean, Product Specialist at Saasyan.

 

Download the full Innovation in Education report for more insights from these K-12 thought leaders and additional industry research from THE Journal.

Safe & Sound Schools: Cybersecurity in K-12

A year ago, IT professionals in K-12 school systems became heroes to their communities when their skills and resourcefulness turned on remote learning for nearly all. But while IT teams were enabling teaching and learning to continue uninterrupted in spite of everything else going on in the world, they were also seeing their systems beset by relentless attacks. More school districts than ever have been victimized by ransomware, data breaches, and other forms of digital malfeasance. While there’s no way to guarantee your schools will avoid all cyber incidents, the preemptive moves you take will make digital and online activities ever safer for your district users. Learn how your institution can adapt to this new environment in Carahsoft’s Innovation in Education report.

 

Closing in on Cybersecurity Stability

IIE Journal October Safe Schools Blog Embedded Image 2021“Traditionally, for good reasons, the conversation in K-12 has been focused on education. The priority for spending has been steered toward academics — getting more support and training for teachers and trying to control the classroom size, for example. Technology, and especially cybersecurity, was a scheduled expense, up there with predictable plumbing problems and textbook replacement, but contained within the IT organization. However, IT — and especially cybersecurity — has now become a strategic element for education. Parents, superintendents, board members and executives within administration have realized that keeping data and systems safe can have a district-wide impact. Experience a data breach or a ransomware event and you’ll suffer damages that strike your budget as well as your reputation: Families will leave your schools to go to the district next door that didn’t have a break-in. That means it has become something that should be part of all decision-making.”

Read more insights from Palo Alto Networks’ Cybersecurity Strategist, Fadi Fadhil.

 

Getting Away from the Ransomware Triple Threat

“Even though it’s now a simple matter to go online and learn how to launch a cyber-attack and buy the tools to do so for just a few dollars, ransomware has become a more complicated process, involving triple extortion. Originally, the idea was that the bad guys would get into your computer system, encrypt your data and tell you that in order to get the data back, you’d have to pay x bitcoins. That was pretty direct; you either paid the money and hoped they’d give you your data or you had backups, because a good backup policy would prevent an attack from imposing any lasting damage. So the criminals revised their approach. They turned around and said, ‘OK, we’ve encrypted your data. Pay this amount to get it back. And by the way, we also stole your data. If you want to prevent this data from being made public, you will pay the same amount of ransom, and this is the deadline.’”

Read more insights from HPE’s Distinguished Technologist in Cybersecurity, James Morrison.

 

The Essential Cybersecurity Service You’ve Never Heard Of

“The cybersecurity threat to K-12 educational institutions has been consistently growing since 2018. Unfortunately, for many schools, efforts to protect against cyber-attacks have not seen similar growth. K-12 public schools became the number one target for ransomware attacks across all public sectors in 2020. Meanwhile, less than a quarter of school districts have anyone dedicated to network security, according to the latest CoSN leadership report. And even institutions with dedicated network security staff may struggle with a lack of funding to dedicate to cybersecurity measures. This poses a challenge for schools that cannot build cybersecurity defenses that match the sophistication of the malicious actors intent on attacking their data-rich networks. Fortunately, cybersecurity help is available, and at no cost. Recognizing that schools, along with other state, local, tribal and territorial government agencies, rarely have the resources they need for cybersecurity, the Center for Internet Security, an international nonprofit, offers essential cybersecurity services through the Multi-State Information Sharing & Analysis Center (MS-ISAC).”

Read more insights from the Center for Internet Security’s (CIS) Senior VP of Operations and Security Services, Josh Moulin.

 

Greatness Awaits: Dump the Paperwork

“Envision this scenario: Requests for payment are sent in via online interface or digitized en masse through a designated service center. The data is vetted to make sure vendors are approved and expenses fall within the expected range or amount. The documentation is immediately tagged for the proper workflow, being approved at each level through a mobile app or computer application. Approvers can be added or removed from the workflow list as staffing or delegation needs change. Those who sit on approvals too long can be notified that the clock is running. Likewise, managers can be alerted when people on their team try to shove payments through without adequate controls or documentation in place. As a result, the right invoices are paid on time, without incurring penalties or losing out on possible rebates offered by the vendors. Any physical space dedicated to holding onto paper documentation can be dedicated to other purposes. On the expense side, schools can eliminate adult arts-and-crafts.”

Read more insights from SAP Concur’s Public Sector Senior Director, Jim McClurkin.

 

Virtual is Here to Stay, so Make It Better

“With the return to the physical classroom, you might think schools should tuck away their Zoom licenses for the next time an emergency strikes. But that would be short-sighted. Educators have seen how technology can play a role in delivering learning options for students who can’t attend in person. Now that K-12 administrators are reimagining and redesigning education, school districts would be foolish not to learn from their pandemic experiences. Their big lesson? Schools need virtual options. They need them for students who, because of physical, emotional or mental disabilities, can’t be in the classroom; who have dropped out just shy of a few credits and really want to earn that diploma; who are working to support their families; who are taking care of younger siblings; or who want to participate in dual enrollment and can’t get the unique classes they need through their own schools.”

Read more insights from Class Technologies’ VP of K-12 Strategy, Elfreda Massie.

 

Start with the End(point) in Mind

“While the concept of zero trust serves as a useful framework for understanding the goal of posting a guard at every entry and maintaining clear lines of authorization and authentication, getting it done is another matter. Somebody has to do the work of implementing endpoint management and security. Consider the challenge of mobile endpoint patching. IT churns through cycles continuously applying long lists of patches, mitigating risks for which there may be no exploit and that may not be in line for attack. According to a recent Ivanti report, “Patch Management Challenges,” 71% of IT and security professionals find patching to be overly complex and time-consuming. And the patching efforts may only address district-owned devices along with the small share of end users with their own devices who are willing to go through the patch process. What about everybody and everything else? The key is knowing what patches are crucial and being able to prioritize patch decisions that are going to provide comthe greatest security. The patch management approach needs to apply threat intelligence and risk assessment. Then it needs to be enabled on all devices — district-owned or not — without the process relying on interaction from users.”

Read more insights from Ivanti’s Public Sector CTO, Bill Harrod.

 

How to Tame the Cloud with One Call

“K-12 professionals are continually trying to keep their heads above water. They’re drowning in paperwork, processes, regulations and general bureaucracy. And they just need relief. If you’ve got 100 different contracts, every time you touch those contracts to manage them, support them, make amendments, check that they meet state and federal compliance guidelines, and more, it increases the total cost of ownership for every one of those cloud products and services. E&I helps you reduce this work, so that you can spend more time and energy in what you love to do, which is helping students learn.”

Read more insights from E&I Cooperative Services’ Vice President of Technology, Keith Fowlkes.

 

Download the full Innovation in Education report for more insights from these cybersecurity thought leaders and additional K-12 industry research from THE Journal.

The Best of What’s New in Hybrid and Remote Work

When the COVID-19 pandemic struck in March 2020, agencies scrambled to expand secure connectivity and acquire mobile devices, but most state and local CIOs say their organizations transitioned relatively easily to working from home on an emergency basis. Now, with COVID-19 cases in the U.S. dropping dramatically and economies reopening, public agencies face a more complicated issue: figuring out where and how state and local government employees will work going forward. A 2020 CDG national survey found almost 75 percent of respondents anticipate hybrid work — where employees work from home at least on a part-time basis — will be their long-term model. The trend is particularly strong at the state level where just 16 percent of respondents anticipate returning to a fully in-person work environment. Read the latest insights from industry thought leaders in hybrid and remote work in Carahsoft’s Innovation in Government® report.

 

Modernizing Contact Centers to Enable Remote Work

“To ensure callers have a secure, fluid and reliable customer experience, agencies must maintain diverse channels of communication. Another challenge is ensuring that contact center agents have secure and timely access to their agency’s database, intuitively orchestrated communications and sufficient bandwidth for reliable connectivity. Organizations also need to minimize the learning curve associated with introducing new endpoints such as Bluetooth-enabled headsets, softphones and web real-time communication (WebRTC), which eliminate the need for traditional desk phones and enable workers to use their laptop for voice or digital interactions.”

Read more insights from Genesys’s Senior Solutions Consultant, Ivory Dugar.

 

The Digital HQ: Flexible, Inclusive and Connected

“What we’ve seen over the past year hasn’t just been about working from home. It’s been working from home during a pandemic. As the pandemic has stretched into its second year, employees are feeling the strain. The data show that even though the work-from-home experience is better than working in the office full time, employee satisfaction with work-life balance has declined and stress and anxiety have increased. A contributing factor to that stress is the pressure to demonstrate productivity. A third of remote workers say they feel pressure to make sure their managers know that they’re working.”

Read more insights from Slack’s Future Forum Senior Relationship Manager, Dave Macnee, and Customer Success Leader for Public Sector, Kevin Carter.

 

IIG GovTech Blog Embedded Image 2021Giving Remote Workers Access to Resources They Need

“Centralized IT management and virtualization technology are critical to manage infrastructure and address changes quickly and at massive scale — whether that’s to patch a vulnerability across all user devices, upgrade applications or deploy additional computing resources. IT can make a change once via software and then distribute it to everyone’s device within minutes with minimal downtime. Software can monitor network traffic and resource utilization in aggregate and then automatically allocate resources as needed so organizations don’t have to invest in higher-performance user devices or purchase more hardware. In addition, organizations can isolate workloads and systems for security or other purposes, meaning multiple workloads and operating systems can run on the same device.”

Read more insights from NVIDIA’s Senior Manager of Public Sector, Chip Carr.

 

Managing Process and Cultural Change

“It’s projected that 30 to 35 percent of the public sector workforce will remain remote. A lot of these workers will probably be younger. To attract and engage the workforce of the future, you have to keep systems, processes and tools up to date. Younger people run their lives on their phone. If you expect them to submit to completely manual paper-driven processes, you’ll probably never get a chance to hire them, much less retain them. You also have to find out what they need to be successful in a remote environment; show them a path to promotion; and demonstrate that remote, hybrid and on-prem teams are aware of and understand their value to the organization.”

Read more insights from SAP Concur’s Senior Director of Public Sector, Jim McClurkin.

 

Navigating the New Frontier

“Having more flexibility and removing the location barrier opens up real opportunities, especially when it comes to competing for specialties like IT. Some states prohibit hiring out of state, but organizations can still widen the pool to include candidates beyond their local headquarters. They can recruit candidates who want to reside in areas with a lower cost of living or who don’t have the time to commute, for example. This flexibility also helps attract minorities and women, which in IT work, has been a real challenge.”

Read more insights from CDG Senior Fellow, Peter K. Anderson.

 

Download the full Innovation in Government® report for more insights from these hybrid and remote work thought leaders and additional industry research from GovTech.