Short Training Module: Ransomware in Schools
Jan 10, 2022Hannah Quay-de la ValleeLearn MoreTraining materials on preparing for, preventing, and mitigating ransomware attacks.
Forum Guide to Cybersecurity
Oct 8, 2020Learn MoreA guide with recommendations for education agencies on how to prepare for, mitigate, and recover from a cybersecurity incident.
- Model
Model: Data Breach Guidance and Checklist
Aug 4, 2019Learn MoreThe guidance and checklist in this document is provided by USBE for Utah LEAs as general examples illustrating some current industry best practices in data bre…
- 1- or 2-pager
Cyber Insurance: Do you meet the requirements for payout?
Jun 19, 2019Learn MoreCyber Insurance protects from damages of equipment caused by breach events and some loss of service. This resource will help you figure out if you are qualifie…
- 1- or 2-pager
Quick Security Tips for Vendors
Nov 9, 2017Learn MoreThis tool, a companion to FPF's "Quick Privacy Tips for Vendors," is designed to provide a simple baseline of security principles and practices as an ed tech b…
- Model
Data Breach Response Training Kit
Jun 9, 2017Learn MoreAny organization with electronic records is vulnerable to security breaches, and education agencies are no exception. The PTAC Data Breach Scenario is one of a…
- News Article
Data Privacy Issues: Know Your Rights and Responsibilities
May 12, 2017John L. Nicholson, Arthur McCombs, Vadim SchickLearn MoreThis paper offers a broad overview of the data privacy protection regime, as it applies to institutions of higher education. Part I provides an overview of the…
- Report
Just in Time Research: Data Breaches in Higher Education
May 12, 2017Learn MoreThis “Just in Time” research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about d…
- News Article
College And University Data Breaches: Regulating Higher Education Cybersecurity Under State And Federal Law
May 11, 2017Katie BeaudinLearn MoreThis article discusses the types of breaches commonly faced by higher education institutions and what steps these institutions can take to limit liability and …
- Report
Surveying Encryption Practices of Technology Used Within Schools
May 10, 2017Learn MoreThis study is a result of automated tests on 1,221 logins used by 1,128 vendors for technology used in schools and by youth. We surveyed login locations (login…
- 1- or 2-pager, News Article
Data Security: The First Step to Protect Student Privacy
May 10, 2017Learn MoreThe intent of this report is to present the practical steps that every school technology leader should be taking to ensure security of data, with protecting pr…
- News Article
Deep Dive: Protecting Student Data
May 8, 2017Learn MoreThis article takes a look at how service providers can protect their network and mitigate the risks to student data given the advent of 'bring your own device'…