- This study examined security technologies used, effective security practices, challenges, concerns, and wish list of tech leaders in K-12 settings
- Top security practices included cloud-based technologies, segregated network/V-LAN, two-factor authentication, limiting access, and use of Clever or Class Link.
- Top challenges included keeping users informed, lack of buy-in from staff and decision-makers, lack of expertise to implement best practices, and cost of resources
Our experts love to share relevant articles and information from our most trusted educational partners. The views expressed in these pieces do not necessarily reflect the opinions or endorsement of Bluum. All materials are cited for easy reference to original sources.