Category: Industries

Back to School – Laptop Theft 101

Stop me if you’ve heard this one before: Did you know that according to Gartner, a laptop is stolen every 53 seconds? It’s not a joke. According to the University of Pittsburgh your laptop has a 1 in 10 chance of being stolen and a nearly 98% chance of never being recovered. Did you also know that nearly HALF of all laptop thefts occur in classrooms?
Most students aren’t likely to to think twice about the value of data on their laptop; they instead think the device itself holds the true value. This couldn’t be further from the truth. The true price of a lost or stolen education device goes far beyond the value of the machine itself. Think of the countless hours and crushing brain energy spent researching and drafting your final thesis, sculpting your musical magnum opus, or the 2,000+ layer Photoshop or Illustrator file you’ve contributed to every week and weekend for the last 4 months of your life. Truth is the data on your device represents irreplaceable concentration, time and effort – invaluable commodities in today’s fast paced digital landscape.
Losing a device is one thing, but losing the data on it – potentially hundreds of hours of work – can drastically interfere with your education goals not to mention cause additional stress during an already difficult time of your life. Don’t take that risk.
Of course there are software ‘solutions’ like popular anti-theft products but they’re bulky, expensive, and stop short of offering TRUE protection. Sure, many can tell you the location of your device but will they actually assist in the RECOVERY of your device once it’s missing or stolen?
What then can be done to protect your device AND it’s data? Beyond protective software, you can start by practicing our top ten recommendations for laptop security:

Never leave your laptop unattended .
Keep your laptop in a secure, hidden place .
Lock doors and windows when you’re not in your room .
Use a discreet laptop case .
Never leave your laptop in your vehicle .
Purchase a Laptop Theft Recovery Solution .
Personalize your laptop’s looks .
Write down your laptop’s serial number .
Use secure passwords and update them regularly .
If someone tries to take it, give it up – it can be replaced… you can’t !

What happens when even these tried and true methods fail, I hear you ask?
Luckily there is one solution that CAN and will go the extra distance; Absolute Home & Office. With features including device locate, remote content lock and delete, as well as a theft recovery team who works with local law enforcement to actually recover your stolen or missing device. It’s also currently on sale for the back to school season. 50% off a PREMIUM 1 year plan, as well as the STANDARD product for just $1.99/month.
Stay safe out there.

How to Improve Data Security in the Financial Sector

Financial service organizations including banks, wealth advisors, insurance providers and others rely on data to power their business. As a result, they hold vast amounts of highly sensitive, personal information and today, all of it is of course digital. This treasure trove of data makes the financial services industry a highly valued target for cyber criminals and a quick check of headlines prove they have been busy taking what they want from many. From Capital One to Equifax and countless others in between, data breaches across the financial sector are massive both in scope and cost.
High Cost of Data Breaches
As this year’s Cost of a Data Breach Report by the Ponemon Institute again shows, the price tag for falling victim to hackers continues to climb. The global, cross-industry average cost is now $3.92 million – an increase of 12% over what it was just 5 years ago. Driving the rising costs for all U.S. organizations is the lost business that results from a breach including lost customers, system downtime and general business disruption.
Adding further insult to injury, the financial impact of a data breach can last for years, particularly for highly regulated industries like financial services. Long, complex governance processes in which legal fees and fines are dragged out for long periods of time are painfully common. As the regulatory environment continues to evolve, with new state data protection laws such as the California Consumer Privacy Act (CCPA) coming onto the scene for example, compliance challenges and associated fines for financial services and other industries will only grow.
3 Steps to Better Data Security
How are cyber attackers getting in? There are several studies on this and for the financial services industry specifically right now, most point to phishing attacks as the primary culprit. Intended targets include both the institution’s employees and their customers.
Regardless of tactic however, there are a few steps you can take to improve your security posture.

Know your endpoints. Comprehensive asset intelligence equips IT and security teams with the full story of their device population and provides a single source of truth into where your devices are, how they are being used, and whether or not your security controls are working as they should. The 2019 Endpoint Security Trends report found 42 percent of all endpoints are unprotected at any given time and 100 percent of endpoint security agents eventually fail. Timely insight into your users, device fleet, the apps they run, and the data they touch will help you identify blind spots that often represent a breach waiting to happen.

Fortify endpoint resilience. To mitigate risks and potential security exposures, ensure your endpoints are self-healing machines capable of safeguarding distributed data without the need for human intervention. Automated self-healing is critical when it comes to fending off the barrage of attacks you (and your users) face every day. Absolute is already embedded in your devices; you just have to activate it. OEMs, including Dell, HP, Lenovo, and Microsoft, ship their machines with Absolute’s firmware-enabled Persistence™ module. With this unshakable connection to every device, Absolute examines hygiene and compliance drift, regenerates controls and boosts the resiliency of all your endpoints.

Implement the NIST Cybersecurity Framework (NIST CSF). Because much of the high cost of a data breach comes from compliance failures, continuous compliance must become your new normal. Ongoing, flexible checks that adapt to any standard like GDPR, SOX, PIPEDA (among others) are needed to identify and restore critical security controls including AV, encryption, EDR, DLP, VPN and others that cause compliance drift when disabled or outdated. One-way organizations are responding to this continuous need for visibility and control is by adopting the NIST CSF. The repeatable framework supports proactive cybersecurity disciplines and enables scalable operations. For more, read: How to Use the NIST Cybersecurity Framework.

The financial services industry doesn’t have the sole attention of cyber criminals – no industry is immune to attack anymore. But knowing your specific risks is the first step in providing better protection for your organization as well as your customers.
For more information on how Absolute helps financial organizations protect data and remain compliant, see our solution sheet.
 

Quantifying K-12 Device Use with Absolute

K-12 schools across the country rely on technology to further individualized learning but quantifying the efficacy of this effort and maintaining the fleet of devices that one-to-one computing requires comes with unique challenges. With funding opportunities on the decline, schools are increasingly challenged to prove that technology has had a meaningful impact on student outcomes.
Loudoun County Public Schools (LCPS) is the third largest school division in the Commonwealth of Virginia with more than 78,000 students in 89 facilities. In order to support their personalized learning initiative, the district invested heavily in a one-to-one program for students and staff, adding thousands of devices for use in-classroom, at home, or by teachers who travel.
The Challenge: Demonstrate Device Use and Keep Them Secure
In order to secure the budget for the purchase of tens of thousands of devices, Dr. Rich Contartesi, CIO for LCPS, was tasked with demonstrating device utilization rates, no matter if the device was on or off the school network, to drive consensus that teachers did need a laptop and that students were benefiting from using laptops in the classroom. The Board also needed assurances that security of sensitive data and device theft recovery were prioritized to safeguard the investment in these devices.
Read: Student Technology Analytics Key to K-12 Digital Learning
The Results: Increased Device Utility and Minimized Risk
Using Absolute, LCPS was able to provide quantitative information on device utilization rates right away. With security in mind, LCPS chose to purchase Dell laptops, which are protected from the factory with Absolute Persistence. Out of the box, these devices are able to withstand tampering and may be tracked no matter where they travel. With Absolute, the LCPS IT team now receives automated alerts on anomalies, so they can focus on reviewing potential security issues and taking action to ensure endpoint protection and data privacy.
“We were able to provide the board with quantitative information about device utilization that derives consensus so the budget could be approved. Also, peace of mind with security, privacy and theft recovery,” Contartesi said.
With Absolute, LCPS now has peace of mind of endpoint security, device theft recovery and data privacy. They have minimized their risk and increased the value and utility of their devices.
Learn more about how Absolute enables personalized learning at Loudoun County Public Schools by minimizing risk and increasing device utility.

Escalating Risks to Healthcare Data

The challenges of securing medical devices from cyberattacks made headlines again last week as the U.S. Food and Drug Administration (FDA) warned that some insulin pumps made by Medtronic MiniMed may be at risk for a cybersecurity breach. In response, Medtronic recalled the affected Minipumps and is providing patients with alternative pumps.
As the healthcare industry quickens its pace toward incorporating more IoT devices and wearables for the sake of improved patient care, there is also a clear downside to the trend. The connectivity inherent in these same medical devices can also pose a serious threat to patients and providers. Device vulnerabilities can lead to security breaches that could potentially impact the safety and effectiveness of the device. Due to the high value of healthcare data, the risks are escalating rapidly.
Weighing Risks and Rewards
Healthcare organizations and patients alike must weigh the risks and rewards of relying on such medical devices the same way they already consider the pros and cons of their network connected endpoints. Laptops, tablets and phones have proven to be a critically important piece to delivering cutting-edge patient care as well as growing organizational efficiency. For large hospitals, small doctors’ offices and every healthcare provider in between, mobile medical technology is how modern patient care is delivered.
But securing patient data — including personal information, payment details, health histories and more — on vulnerable endpoints has long been a real problem for the industry. More than 2 million people saw their information exposed via a healthcare data breach in May alone.
Government regulations that oversee the protection of personal information — including HIPAA and a host of others — are busy trying to keep up with breach investigations. Large fines are regularly doled out, yet the pilfering by hackers continues at a relentless clip. At the same time, security spend is also on the rise, motivated by organizations scrambling to fend off attackers.
Read: The State of Endpoint Health in 2019
Now What?
A strong security posture must start with unparalleled visibility — because you can’t secure what you can’t see. This is the approach Allina Health, the major healthcare provider for the state of Minnesota took when they implemented Absolute across their more than 10,000 devices.
With Absolute, Allina Health can see all of their devices, whether they are on the network or not, identify devices that are missing or not being used, and prove that security controls such as patch management, antivirus and encryption are always in place. In addition, Allina Health has been able to save over one million dollars by identifying underutilized assets, prove compliance with HIPAA by validating that encryption is in place on all devices, at all times, and achieve 95 percent laptop auditing accuracy.
“I sleep better at night knowing that if a device goes missing, we have the tools and services that Absolute provides to track it down…and validate that encryption was in place [when the incident occurred],” said Danielle Bong, IT Asset Manager, Allina Health.
Healthcare endpoints are key to providing better patient care and improving organizational efficiency – security improvements must be made for the benefit of everyone but the hackers.
To learn more about how Allina Health uses Absolute, download our case study: Allina Health Ensures HIPAA Compliance.
 

Education & Internet Safety: Prove CIPA Compliance with Absolute

As technology continues to be rapidly adopted in education, the pressure is on to secure and retain the grants that make devices in the classroom possible. Schools must compete to prove effective technology utilization while taking steps to ensure compliance with the Children’s Internet Protection Act (CIPA), and the E-Rate Program.
E-RATE: TECH ADOPTION & INTERNET SAFETY
The E-Rate Program supports connectivity. Through grants, it provides discounts up to 90 percent to help schools and libraries obtain affordable internet and telecommunication access.
Eligible schools need to certify they have an online safety policy in place that is supported by technology protection measures. These measures must block or filter harmful content, and monitor the activities of minors.
GET VISIBILITY, PROVE COMPLIANCE
While school districts can meet CIPA compliance requirements by installing software that filters web content, it’s another challenge to know and prove these programs remain installed and are effective.
With Absolute’s unique solutions for education, K-12 school districts have uncompromised visibility and remediation of their devices – whether inside or outside the school network. Absolute also gives districts true, layered visibility into data and applications that can’t be removed or tampered with by overzealous students, or malicious attackers.
The self-healing capabilities of Absolute’s Persistence technology helps school districts ensure that critical security features such as web filtering or cyber-attack protection remain in place and stay functional – making it easier to prove CIPA and E-Rate compliance.
STUDENT TECHNOLOGY ANALYTICS, BETTER INSIGHTS
Absolute’s Student Technology Analytics unlocks the door to a host of detailed information that can be applied to contextualize device and end-user activity.
Using data from Student Technology Analytics, schools can better analyze the impact and outcomes of their technology investments. Districts not only see how users interact with technology, but gain insight into online behaviors like application use, websites visited, and device usage.
Absolute is empowering schools globally to deliver safe, secure, and more productive learning environments. Read our whitepaper to learn three important ways that integrating Student Technology Analytics into your technology plans can help your school district.
Read 3 Ways Student Technology Analytics Validate Technology Analytics in Classrooms

How To Control End-Of-School-Year Device Management Chaos

As a former public school teacher, I vividly remember the anticipation that students, my colleagues and I felt when the end of the school year approached. It could never come fast enough.
But as we were dreaming about summer activities and vacations, school staff also had to take care of the somewhat mundane end-of-year administrative tasks — like collecting textbooks, finalizing students’ grades, and cleaning our classrooms. We suffered through it because we knew there was light at the end of the tunnel.
While the situation hasn’t changed much for teachers in the years since I left teaching, IT and asset administrator staff may feel differently today about the end of the school year.
A Different Mindset
For them, the end of the school year brings a chaotic time when all the school district’s computers, especially those the students use for learning, have to be accounted for and inspected for usability next year. Accounting for all these devices can be challenging enough in the best of circumstances, but especially if students are allowed to take mobile devices like laptops or tablets home during the school year to enhance their studying. The difficulty in getting all of those devices back increases exponentially.
The problem here is that primary and secondary school students generally don’t have the same developed sense of responsibility as adults; even though they’re told before the school year ends that they need to return their device, many don’t do it. This is frequently true even when they understand there will be repercussions, such as fines, withholding of grades, or even an inability to register for school next year.
Read: Security Basics for One-to-One Computing In Education
Who Is Responsible?
So what options does a school district have when students don’t return the district’s expensive computing devices at the end of the year?
Remember, very few law enforcement agencies will get involved. They’ll either see the issue as a civil problem and not a criminal violation, or feel (rightfully so) that their job is to protect society and not to expend strained resources on recovering overdue property.
The key to getting laptops and tablets back lies in adopting a multi-pronged approach aimed at both students and their parents. Parents are an essential part of the equation because often they’re led to believe their child has turned the school device in then discover the device in the child’s bedroom. Or perhaps the parent sincerely intends for their child’s device to be returned, but long hours at work or a lack of transportation make coordination with the nearest campus difficult.
Device Recovery 101
To recover as many devices as possible, here are a few suggestions:

Begin the outreach to students and parents well before the day the devices are due to be turned in. This can be accomplished via a notice on the school district’s website or newsletter, a blast email to all parents, sending a note home with the students, or an end-user message that appears on the monitor of the students’ devices. Or all of the above! One customer recently advised that they’ve had success in including a message about the turn in date on each device’s wallpaper.
Regardless of the above techniques you use, remind the students and parents of the date when the devices will be collected more than just once. Everyone is busy these days, and with all the excitement over the end of the school year, it’s easier for people to forget important dates. We recommend a notification 30 days before the devices are due, again at 15 days, and once again the day before.
When a student fails to return an issued device at any point during the school year, you should attempt to report that loss of school property to your local law enforcement agency. While they might not actively investigate, they should enter the serial number of the missing device into a nationwide database used by police to identify missing and stolen property. That way, if a police officer eventually happens upon one of your unreturned devices, he or she can seize it and return it to you.
Contact with parents of students who still didn’t turn their device in, despite all outreach efforts before school ends, will be most effective if attempted over more than one communication medium. Some parents respond better to phone calls, some to emails, and some to written letters on district letterhead that may convey a more serious tone. Additionally, some of the contact info you have for a parent may no longer be accurate.  Therefore, we recommend calling, sending emails, and sending letters. These three steps can be done concurrently to ensure the parent or guardian is reached as soon as possible, or they can be sequential to save staff time. In other words, parents of all delinquent students first get an email. Those that don’t respond are then called. If contact hasn’t been made or the device still isn’t turned in after emailing and calling, then a letter on district letterhead should be sent.
The content of the communication should be firmly stated and should indicate the repercussions for not returning the school property (you are going to enforce consequences, aren’t you?). While a student keeping a device over the summer isn’t akin to a criminal breaking into a school and stealing a device, the bottom line is that you are still being deprived of taxpayer-funded equipment that you are accountable for and will be needed when school starts in the fall. The student may not have kept the device with any criminal intent, but they possess something that doesn’t belong to them. You may even advise them that the device has been reported to law enforcement as a way to convey the seriousness of the situation, which can easily and immediately be resolved by simply returning the device.
Finally, admin staff should have the ability to remotely freeze or lock devices not turned in on time. This prevents the student from using the device any longer and will also serve to let them know that even though you don’t physically possess the device you can control it. A good device freeze or lock tool allows you to customize a message that will appear on the screen when the device is frozen, which you can use as yet one more method of notification.

Approaching the complications surrounding unreturned devices in a coordinated and systematic manner will yield the most significant results. Primary and secondary school students can’t be expected to treat this situation like the vast majority of adults, but that shouldn’t mean those devices not turned in should merely be written-off. Writing off a device doesn’t provide enough incentive for those same students to neglect turning in the devices when next year rolls around.
Here’s the formula: by using multiple communication attempts over various communication channels directed at both the parents and students — combined with the ability to remotely freeze a device to prevent further use — will ensure that fewer devices will ultimately need to be replaced.
Maximize your technology investment and safeguard your students and devices with the Absolute platform. Learn more about why superintendents, IT teams, and teachers trust Absolute.

Student Technology Analytics Key to K-12 Digital Learning

As schools let out for the summer across North America, educators and administrators shift their focus from the classroom work of today to how to generate even higher degrees of learning tomorrow. Technology is an important piece to that puzzle — few question the merits of high tech classrooms anymore — but demonstrating a meaningful use can be a challenge. Despite the difficulty, it’s a much-needed exercise because use, or more to the point, student learning outcomes that come as a result of technology use, is how budgets are built.
Digital Learning is Here to Stay
A new survey by Common Sense Education shows 95 percent of K-12 teachers are using technology to aid learning today. Furthermore, 80 percent have computing devices in their classrooms and 40 percent rely on 1:1 devices.
Read our primer on 1:1 devices: Security Basics for 1:1 Computing in Education
K-12 schools across the country are relying on technology to support individualized learning and skills development. They are also moving toward integrated digital platforms to oversee homework, encourage student/teacher collaboration, and create exciting new avenues of learning.
But another aspect of education that also isn’t going away any time soon, unfortunately, is over-stretched budgets. If a school is going to spend some of their precious resources, they must have good reason. And that reason is best demonstrated with high ROI. But how can educators and administrators ensure technology investments are contributing to student performance? And, how can they ensure both their investment and the student data remain secure?
Support What’s Working, and Eliminate What Isn’t with Technology Analytics
K-12 schools are now collecting more data than ever before. The challenge is how to translate all that data into meaningful, actionable information. Are students using the devices? How are they using them?  When and for how long?  A data-driven school would be able to leverage information on student device interaction as well as performance and translate that into a meaningful impact on student outcomes. Proving the positive influence of technology also ensures school investments line up with education goals.
This kind of data becomes available when you rely on a student technology analytics tool. Strong data, in turn, can help maximize your technology investment by measuring learning outcomes. A narrower look at activity can also safeguard your students and their devices.
If you would like more information on how data can help drive your classroom technology use and spend, download our whitepaper: Three Ways Student Technology Analytics Validate Technology Investment in Classrooms

Security Basics for One-To-One Computing In Education

One-to-one (or 1:1) computing can be a game-changer for K-12 schools, but before embarking on any hardware strategy, it’s critical to understand the big picture of how devices and endpoints should be managed.
First, a brief definition: one-to-one computing refers to a system in which every student has his or her own internet-connected laptop or tablet to use 24/7. In most cases, students use these devices at school and at home to work, communicate, collaborate, and research.
Before committing to a 1:1 program, you’ll want to answer these questions:

Are devices being used? When? How much?
Is it consistent across the district, e.g. different students, classrooms, levels, schools?
What decisions could the district make based on usage information?
Are students allowed to take computers home?
When there’s inclement weather, can you validate students are actually using the devices?

Bountiful Benefits
The advantages for schools that embrace a 1:1 program are numerous. The most prominent is equal access and standardization, leveling the playing field for every student regardless of their learning abilities or demographic background.
When each student has a device, engagement increases and passive learning drastically declines. Even better, lesson or class content can be delivered digitally — which encourages independent study and allows the teacher to devote more class time to students who may require additional assistance.
Collaboration is also enhanced, in which group projects can be tackled during or after class via online collaboration tools.
On the administrative side, the capability for easy device upgrades, simplified networking, and the overall ability to monitor student progress and online behavior are huge selling features. 
Getting Real About the Challenges
However, 1:1 is not without its obstacles. The most obvious hurdle being costs — and it goes beyond the direct hardware costs. Schools must factor in the human resource overhead for increased student training and general computer literacy as well.
Professional development and training for the devices and their applications can take up significant time and focus.
One can also argue that too many 1:1 applications stress technology over learning and that these laptops and tablets may detract from learning. Depending on the curriculum or teacher, managing all these devices and applications may become too burdensome.
One of the major consequences of 1:1 programs is managing all of those devices, which can include provisioning devices, deploying applications, keeping them secure, managing returns at the end of the school year, and more.
Adding to the burden is when schools adopt a BYOD policy.
Why 1:1 is better than BYOD
BYOD brings about a myriad of issues that some schools probably want to avoid. Whereas a standardized device policy means the same equipment for every student, BYOD means a growing disparity that further disadvantages low-income families. Next, the rise in the number of devices being carried to and from school can endanger student safety, making them a prime target for thieves. Further, lost or stolen student devices have a major impact on learning, with no school-district management capability to track or recover these devices.
While BYOD is obviously appealing, the main issues in management, equality of learning and security are driving many districts to reconsider and adopt a 1:1 program instead.
When a school can maintain visibility and control of its devices, students are better protected. The school can be alerted of any suspicious activity so they can remotely detect and remediate at-risk devices.
What It Means For Education To Have Embedded Endpoint Security
Finally, to save even more on IT resources, a year-round 1:1 program can work wonders. Think about it: what happens at the end of the year when all your devices must be collected? It places an unnecessary drain on IT resources. With the support of endpoint tools, districts can perform remote device maintenance, keep track of device inventory and automatically enforce compliance with student privacy regulations such as the Children’s Internet Protection Act (CIPA) —preventing students from accessing harmful content or doing something harmful themselves (like hacking).
Beating The Summer Brain Drain
With these tools in place, supporting a year-round 1:1 program is more manageable. What’s more, these programs can be instrumental in supporting student’s education and the inevitable “Summer Brain Drain.” The stats don’t lie: students lose an average of two months of reading skills and 2.6 months of math skills over the summer, and teachers spend up to six weeks of fall class time re-teaching old materials to make up for this loss.
Ultimately, education is no different from other industries in that endpoints (like student tablets and laptops) must be properly managed. Remember, most successful breaches begin at the endpoint (according to an IDC study, the endpoint was the cause of 70 percent of successful breaches).
If these devices are not well-managed, attacks can quickly morph from a brushfire to a widespread blaze. Maintaining visibility and control of your endpoints is crucial.
Learn more about how Absolute is making a difference in one-to-one programs by watching our Santa Margarita Catholic High School’s One-to-one Program video.
 

Managing and Securing the Digital Classroom

The use of technology in classrooms has revolutionized the learning environment for both teachers and students. It democratizes education by allowing a greater number of resources to be available to a wider range of students. Textbooks are being replaced by digital devices and virtual classrooms, expanding the idea of the ‘classroom’ and enabling teachers to shift the education model to help students develop the skills needed for the digital future.
While there has never been a doubt that technology is beneficial to learning, there was less certainty about how to manage and secure the devices used by students. Heightening the situation, school districts usually operate with lean IT teams and limited budgets, leaving two big challenges to be solved:
1) how can schools rationalize and maximize technology budgets; and,
2) how can they ensure their technology is safe for students, educators, and staff?
Growing Budget and Keeping It
Finding the funds for technology in an already overburdened budget isn’t easy. Most school administrators know the key to securing funding is found in the results or strong learning outcomes. If students learn more, faster and with greater efficiency, digital classrooms are a no-brainer. The hurdle, however, is translating exactly how technology supports improved student learning and then communicating that fact with credibility.
In education, as is the case in every other industry today, data is required to make a strong business case for increased resources. Detailed student technology analytics is a key component to understanding device use and correlating that use to improved academic performance. Data provides you with the foundation for solid decision-making as well as a way to justify ROI and secure further budget. School boards and other stakeholders want to invest in technology for learning, but schools must prove that they are good stewards of that investment in order for it to continue.
Protecting At-Risk Devices and Data
With new technology comes added risk, including major data privacy concerns. Cybersecurity is now the number one priority for K-12 IT teams according to the latest K-12 leadership survey by COSN. In fact, there have been 479 cybersecurity incidents during the last two to three years, and schools with known one-to-one programs are often targeted by thieves. Kids themselves are also increasingly the victims of theft as they walk to and from school, or even within the school grounds.
In addition, students regularly lose or misplace devices which can lead to exposed sensitive information and/or unauthorized access to the school network. The theft or loss of a device has many repercussions. A stolen student device, school-owned or BYOD, greatly impact that student’s learning ability, as device replacement through insurance can take up to eight weeks.
Within K-12 specifically, the need to ensure that the content accessed by students is also sanctioned. If not adequately protected, the information contained on or accessed through these devices could pose threats that lead to data breaches and fines by the ICO.
Safe, Smart, Secure Schools
In order to sustain digital classrooms, technology must be managed and secured regardless of form, factor or operating system. In our highly mobile environment with devices continuously on-the-move and off the school network, persistent visibility and control is no longer a nice-to-have. It’s a must.
Read: Better Device Security in 3 Steps for Education
With one single solution, IT should be able to determine the status of each device, manage typical IT maintenance requirements, and take immediate security actions when required. This streamlined, automated management option not only provides important security but also improved operational efficiencies that can cut down on hundreds of IT hours.
It may seem like a steep curve, but it is possible to support the shift to digital learning while also helping to protect school districts’ investment in technologies. Absolute’s Persistence technology is embedded in the core of devices at the factory, providing a reliable two-way connection so that education organizations can confidently manage mobility, investigate potential threats, and maintain the safety of students who use these devices. Student Technology Analytics allows schools to prove the positive impact of technology to secure continued investment and ensure no student gets left behind.
It’s an exciting time to be an educator. Learn more about how Absolute is uniquely positioned to help manage and secure your Edtech investment in the IDC commissioned report, Student Technology Analytics: How K-12 Leaders Make the Case for Better Technology in the Classroom.

Better Device Security in 3 Steps for Higher Education

Universities and colleges have diverse challenges when it comes to risk management. To provide a progressive learning and research environment, broad, collaborative network access must be made available to a wide range of users. Decentralized data systems and countless user endpoints – that leave the campus daily – result in blurred perimeters.
To compound the issue, the vast amounts of personal information held by every higher education institution, as well as valuable intellectual property, makes education an attractive, high-value target for cyber criminals. And the sensitive nature of the data they keep also means education is highly regulated — which only ups the stakes for everyone. How can these institutions keep students and devices safe without sacrificing their charter?
Better Security in 3 Steps
When building a security program for your institution, start with what is most vulnerable – endpoints. Continuous visibility and control will deliver improvements, even when faced with a limited budgets.

Track and Manage Assets — Because you can’t secure what you can’t see, you first need visibility into all of your devices, their applications, and your users. Absolute’s patented Persistence® technology provides an unbreakable connection to every device, keeps inventory automatically up-to-date, collects hardware, software and geolocation data points, reveals waste and inefficiency, as well as pinpoints security risks and compliance failures.
Automate Security Agent Resilience — Examine endpoint resilience and compliance drift, and regenerate security controls — such as encryption, anti-malware, VPN, EDR or DLP — whenever necessary. With Absolute, endpoints become self-healing machines, capable of safeguarding the distributed data they contain, enabling IT to keep control of every endpoint and freeze or wipe it remotely at any time.
Maintain Continuous Compliance — Conduct ongoing and flexible checks according to a cybersecurity framework or your own standards. Specifically, many have found the NIST Cybersecurity Framework particularly comprehensive and worthwhile. (Watch this explainer video: NIST Cybersecurity Framework.) Absolute can help you identify where compliance may have failed and will restore controls that cause compliance drift when disabled or outdated.

On or Off the Network
No matter where your devices are, you need to see, understand and control your entire endpoint population at all times. The loss of sensitive information brings with it costly compliance fines but even more damaging, broken trust among students, educators and staff. Higher education data security isn’t always straight forward but step-by-step, progress can be made.
To learn more about how to identify your institutions sensitive data and improve both visibility and control over it, view Absolute for Higher Education. 

Loading

Categories