Conscientious school boards are moving cyber risk management to the rank of a board-level priority. The 2017 ISIS hijacking of 800 schools’ websites to air recruitment propaganda to children served as a wakeup call, but many hit the snooze button. The recent hacking of the San Diego Unified School District sounded the alarm again; the district lost confidential records on over 500,000 students and staff over a 10-year period. This time, responsible school boards will get serious about implementing a cyber risk framework to bolster their cyber defenses. But where to begin?
Suites of costly consultants stand at the ready to guide you through the process, but few school boards can afford them. Even for-profit sectors have stopped short of full implementation as consultants walk them through such popular schema as the National Institute of Standards and Technology (NIST)’s Cybersecurity Framework (a.k.a., CSF). More than 50% of respondents to a 300-person, multi-industry survey by Tenable, Inc. cited cost as the prohibitive barrier to completing the processes dictated by CSF (“NIST Cybersecurity Framework Adoption Hampered by Costs, Survey Finds.”)
Using top board portal software, a school board can apply the principles underlying such lauded protocols to its own cyber risk framework, creating a repeatable, adaptable series of actions to stay a step ahead of hackers: (1) conduct a cyber risk gap analysis; (2) itemize actions needed to close that gap; and (3) implement the actions (“Beginner’s Guide”). Leveraging the capacities of top board portal software, a school board’s cyber risk framework could customize those measures as follows:
Not just any technology professional is qualified to conduct such an audit. The complexity of the job calls for an IS or IT executive – perhaps the CIO or a member of the Risk Committee. Some outside consultants also have the credentials required.
Many states and state school board associations offer grants to offset the cost of a high-level risk audit. Some school boards tap state and regional networks to share costs with peer districts.
The audit should cover more than penetration testing of hardware. Since human error causes more data leaks than any other source, the auditors should also spend time monitoring board communication habits. If the board makes common mistakes like attaching sensitive documents to emails, they can eradicate that considerable risk by directing the board to store and edit documents through the secure board portal.
The gap analysis will result in an objective report of present cybersecurity vulnerabilities that keep the board from attaining a targeted risk profile. “Reducing cyber risk” ceases to be a vague and impossible imperative. Even if the gap is large, it becomes a known quantity, the kind that can actually be addressed.
Hold paperless meetings. The agenda, preparatory readings and minutes can all be posted and continuously stored on the board portal, increasing security. Paper copies can proliferate without a trace, and they’re easy to steal (or to leave behind on an airplane, etc.)
Conduct board communications exclusively on board portal software with full 256-bit encryption. It alone offers the highest level of security for sensitive documents.
Store data on a private, cloud-based server. While any digital storage method is safer than keeping paper files, not all offer equal protection. Storing documents on “the cloud,” as most file-sharing apps do, is especially insecure. Board portal software stores files on a private, cloud-based server, effectively moving it from Grand Central Station to a vault in the basement.
Ban downloads of board documents onto personal devices and hard drives. The board portal will keep them in one safe, centralized location where any board member can get to them in a matter of minutes.
Collaborate on editing through the board portal. It is hardly a sacrifice to do group editing while keeping the document out of harm’s way; the best board portal can identify each set of comments by the contributor’s name (indicated by color coding), as well as a time stamp. As each set of comments is entered, the shared version presented on the portal is refreshed in real time so that everyone now sees them. A designated super-editor can have sole authority to accept any or all of the recommended changes.
Require multi-factor authentication to gain board access, with complex passwords and biometric scans among the identifying protocols. Be sure your board portal software is capable of recognizing such inputs.
Conduct board training two to four times a year. Regular offsite group board training saves your data from the pervasive threat of a user who “innocently” makes errors.
Keep sensitive data away from the public through role-based authorizations. School boards must keep agendas and many documents open to the public, but the board needs to see information protected by FERPA and even HIPAA. The only foolproof way to keep them consistently segregated is to use a board portal that provides different versions of documents to different audiences, according to a set list that filters users according to their role in the organization.
Develop and rehearse a technological emergency preparedness plan. The community will look to the school board for leadership in the event of a cyber-emergency. To have the best chance of recovering data, the board needs to have a clear vision of who-does-what after a breach.
Screen third-party vendors who interact with the network. Different offices in the district interact electronically with outside entities in their supply chain. A virus or bug in one of their networks could infect the district’s system. Smart boards, therefore, get security ratings of the other entities with which the district does business.
Conduct security audits at least twice a year. Once is not enough. The next security audit will bring you up to date on how much of a gap still remains.
With a fully secure board portal and a clear vision, school boards can reduce their cyber risk with a rigorous framework of measurements and corrections. It doesn’t take a rocket scientist, but it does take a bold plan, consultation with experts and strong leadership.
DarkReading, “NIST Cybersecurity Framework Adoption Hampered by Costs, Survey Finds,” March 30, 2016 at https://www.darkreading.com/attacks-breaches/nist-cybersecurity-framework-adoption-hampered-by-costs-survey-finds/d/d-id/1324901
Shashank, “A Beginner’s Guide to Cybersecurity Framework,” Edureka July 11, 2018
Tenable Network Security, “NIST Cybersecurity Framework Adoption Hampered by Cost, Survey Finds” https://www.tenable.com/in-the-news/nist-cybersecurity-framework-adoption-hampered-by-costs-survey-finds
Tenable Network Security, “Survey of Trends in Security Framework Adoption Survey,” Tenable Network Security, Inc.