The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio

Similar documents
Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

THALES DATA THREAT REPORT

A Ready Business rises above infrastructure limitations. Vodacom Power to you

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Incident Response Table Tops

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

Back to the Future Cyber Security

KEYCLOUD BACKUP AND RECOVERY AS-A-SERVICE (BRAAS): A fully-managed backup and recovery solution for your mission critical data

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Provided as an educational service by: Introduction

How Switching to the Cloud Drives Employee and Agency Growth

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Why SaaS isn t Backup

PREPARE & PREVENT. The SD Comprehensive Cybersecurity Portfolio for Business Aviation

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE

Disaster Recovery as a Service

What It Takes to be a CISO in 2017

Healthcare HIPAA and Cybersecurity Update

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

ABOUT US SECURITY. A Legacy of Providing Solutions. Protecting Your Data

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Securing Industrial Control Systems

2017 Annual Meeting of Members and Board of Directors Meeting

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Introduction to Business continuity Planning

Welcome to CyberMorning. Executive-Level Briefing

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

Principles of Protection: Cybersecurity Data Protection. 11/01/2017 Julia Breaux William Sellers

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Data Protection, Disaster Recovery, and Ransomware Protection with DRaaS

WHITE PAPER. Header Title. Side Bar Copy. Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER

Best Practices in Securing a Multicloud World

Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International.

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk

The 10 Disaster Planning Essentials For A Small Business Network

PCI DSS Compliance. White Paper Parallels Remote Application Server

HOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018

CLOSING IN FEDERAL ENDPOINT SECURITY

Disaster Recovery Is A Business Strategy

How to Underpin Security Transformation With Complete Visibility of Your Attack Surface

Keys to a more secure data environment

Records Information Management

Evolved Backup and Recovery for the Enterprise

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

The case for cloud-based data backup

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Cyber Crime Seminar. No Victim Too Small Why Small Businesses Are Low Hanging Fruit

We Make IT Simple. IT Support and Security Specialists.

Outwood Grange Academies Trust ensures teaching continuity with Arcserve UDP

Building a Threat Intelligence Program

The 10 Disaster Planning Essentials

Sage Data Security Services Directory

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

Total Cost of Ownership: Benefits of the OpenText Cloud

Florida Board of Governors General Office Legislative Budget Request

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Create the ideal conditions for your network to grow.

Guide. A small business guide to data storage and backup

Cybersecurity Today Avoid Becoming a News Headline

FUJITSU Backup as a Service Rapid Recovery Appliance

Integrated Access Management Solutions. Access Televentures

Simple and Secure Micro-Segmentation for Internet of Things (IoT)

T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE

The Case for Office 365 Backup. Uncovering critical reasons why organizations need to backup Office 365 data

product overview CRASH

HIPAA 2017 Compliancy Group, LLC

THE STATE OF CLOUD & DATA PROTECTION 2018

ALTITUDE DOESN T MAKE YOU SAFE. Satcom Direct s Comprehensive Cyber Security Portfolio for Business Aviation

Security and Compliance for Office 365

IT SECURITY FOR NONPROFITS

Tips for Effective Patch Management. A Wanstor Guide

Why is Office 365 the right choice?

ACM Retreat - Today s Topics:

Data Center Operations Guide

UPDATE: HEALTHCARE CYBERSECURITY & INCIDENT RESPONSE Lindsay M. Johnson, Esq. Partner, Freund, Freeze & Arnold, LPA

Cloud-based data backup: a buyer s guide

A GUIDE TO CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING

A quick-reference guide to secure your organization s data and reduce cybersecurity attacks

5 Things Small Businesses Need to Know About Disaster Recovery

THE DEFINITIVE GUIDE TO BACKUP FOR OFFICE 365

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

Cyber Security Trends A quick guide

10 Cloud Myths Demystified

Understanding Managed Services

2018 Edition. Security and Compliance for Office 365

Cybersecurity The Evolving Landscape

Endpoint Security Can Be Much More Effective and Less Costly. Here s How

How unified backup and cloud enable your digital transformation success

Cyber security tips and self-assessment for business

Transcription:

Prompt. Courteous. Knowledgeable. Support you deserve. The Value Of NEONet Cybersecurity Why You Need To Protect Your Private Student Data In Ohio 1

TABLE OF CONTENTS 2 2 2-3 4 5 7 Introduction The Three Problems Making Schools And Students More Vulnerable To Cyberattacks Outdated Infrastructure Without Backup Strategies Failure To Adopt Modern Security Standards Information Scattered Across Multiple Platforms And Systems The Solution Comprehensive Software And Services From NEOnet NEOnet Tools Modern, Elegant And Easy-To-Use Conclusion 2

INTRODUCTION In the world of information technology, the only thing that s constant is change. Every year, technology evolves and if educational institutions don t change with the times, they are at serious risk for data breaches and loss of private student data. The world of cyber security is also getting more complex. As schools begin to use more advanced IT programs, the risk of a data breach grows and hackers are aware of the vulnerabilities that are common in the IT infrastructures of schools. Recently, there have been many high profile data breaches at public schools around the US. In 201, a data breach in Concord, New Hampshire, compromised the valuable personal information of employee Social Security numbers, employee names and other data which could lead to the filing of false income tax statements. In early 2017, a security researcher found that the Palo Alto Unified School District in California had a data breach that would allow access to the personal information, addresses and test scores of more than 24,000 students. Without proper security consulting, application choice, and regular updates and maintenance of IT infrastructure, the risk of a serious breach of private student and employee data can increase dramatically. In this whitepaper, NEOnet will take a look at the three most common issues that make Ohio schools vulnerable to hacks and data breaches and how our National Institute of Standards and Technology (NIST)-compliant software can help provide valuable cyber insurance. The Three Problems Making Schools And Students More Vulnerable To Cyberattacks There are a plenty of vulnerabilities present in schools that can increase their risk of serious data breaches from hackers. From poor device management to misguided vendor contracts, there are a wide variety of security issues facing Ohio schools. However, in this section, we ll focus on the three biggest problems that face Ohio schools today and then we ll discuss how they can be addressed by NEOnet. Outdated Infrastructure Without Backup Strategies Schools in Ohio often fall behind when it comes to implementing modern tools, IT support and modern infrastructure that provides increased data security and backup strategies. Often, this is not because of ignorance on the part of school administrators but because of school budgets that seem to constantly shrink year-by-year. IT simply isn t a huge priority for many schools, who would prefer to use funds elsewhere. 3

However, this is a mistake for two reasons. First, outdated infrastructure is inherently more vulnerable to hackers. An outdated server that s running an unpatched operating system may have a huge variety of security vulnerabilities that will never be fixed if it s no longer supported. Hackers can take advantage of this legacy software, and easily steal student data, or even infect IT systems with ransomware like WannaCry or CryptoLocker. Because of this, upgrading IT systems should be a priority for school administrators and IT staff. Second, failing to have a modern backup strategy can make things much more difficult if there is a high-profile data breach. An example of this would be a 2015 hack of the New Jersey Swedesboro-Woolwich School District. This ransomware attack caused the shutdown of systems across four elementary schools and with no comprehensive backup plan in place, they were forced to completely rebuild their computer systems. This rebuild caused a tremendous amount of data loss, and made all computer systems unusable throughout the school district for two entire weeks a price that was nearly as steep as the $128,000 that the hacker was attempting to squeeze out of school administrators. Failure To Adopt Modern Security Standards School districts have a tremendous amount of critical data about students and employees, including (but not limited to): Social Security numbers Employee identification numbers Addresses Student ID numbers Banking information (for payroll) Transcripts and grades All of this data can be used for malicious purposes by hackers who seek to steal the identities of students and faculty alike. But despite the fact that schools have as much critical data as a retailer or a bank, most schools have failed to adopt modern IT security standards and best practices, including: Encryption Firewalls Device management standards Student/Teacher IT education Patching and maintenance of IT infrastructure Due to budget issues, inattention and lack of proper infrastructure, schools are falling behind in security at the same time, hackers begin to use more advanced, powerful tools to gain access to private student information. 4

Information Scattered Across Multiple Platforms And Systems Most schools do not rely on any kind of unified online platform instead using piecemeal applications to track and save data. This means that data is scattered across a variety of different systems and infrastructures each of which may have serious security vulnerabilities. And because school networks are often accessed by students, administration, teachers and even third-party vendors, it s difficult to protect the information contained in these systems, and create a comprehensive IT security strategy. This risk makes it critical for schools to stop using diverse, individual applications and instead turn to secured, encrypted, all-in-one solutions for administrators and staff. 5

The Solution Comprehensive Software And Services From NEOnet We ve discussed at length the causes of poor data security at schools. But what s the solution? Cyber insurance? Updated IT systems? Security consultants? If you re in Northeast Ohio, the answer is all of the above. NEOnet offers comprehensive IT tools for schools all over Northeast Ohio and we re experts in school IT solutions. We work with over 117 total educational entities in Ohio, and represent a total of over 13,000 students. NEOnet Tools Modern, Elegant And Easy-To-Use We offer comprehensive IT tools and applications for educational institutions, including: Virtual Servers Let us host all your servers with our state-of-the-art datacenters, storage and hardware. Our fully functional disaster recovery site not only provides us with a secure location to store backup data, it also generates an up-to-the-hour replication of all our hosted servers. Coupled with our approach to distributed administration, schools don t lose any local control and have the peace of mind that their data is backed up and readily available for a quick restore should any disasters strike. Offsite Backups If you already have a significant investment in onsite storage and servers, let our offsite backup service store your data. This hosted and managed solution takes the burden off of school districts to provide backup software and offsite data protection. Our daily reports let you know the status of your backup jobs so you know your district s data is protected. End-User Awareness Training New to the NEOnet service offering is the latest toolset in training and identifying high-risk end-users. NEOnet has teamed up with the Management Council of the Ohio Education Computer Network and KnowB4 to provide modern tools to not only train end users on internet safety, but also test the retention of that training against simulated attacks. The results of the testing will give schools the opportunity to focus on key individuals in an effort build a more resilient and secure organization. With these tools, it s easier than ever for students, staff, and parents to access the data they need. Best of all, the powerful security precautions and modern technology used in these tools reduces your risk of a data breach. Don t risk your school s network. NEOnet has the expertise, tools and experience required to secure your school and protect valuable private student information.

Conclusion In the modern world, cybersecurity cannot be overlooked anywhere and this includes public and private schools in Ohio. Your IT infrastructure contains a huge amount of personal and private information that can be seriously damaging if it s released to the public so it s critical that you have strong cyber security and cyber insurance to protect yourself in the case of an attack. However, many schools lack this protection, and put themselves at risk. The best way to protect your school in Ohio is with the comprehensive IT consulting and the secure, all-in-one tools provided by NEOnet. With over a hundred schools and educational institutions already using our services, we have a proven track record of success. We can help you protect valuable student information, streamline your administration s IT processes and update your outdated IT infrastructure, ensuring that your data is secure from malicious hackers. So, don t wait. Contact NEOnet today to learn more about our services, products and background and see why we re the number one choice for schools in Ohio. Questions? Contact Executive Director Matt Gdovin at gdovin@neonet.org or call 330-92-3900, ext. 01100 7