Successfully Adopting Technology in the Classroom

Aug. 14, 2017
Deploying, managing and securing devices in K-12 schools can often feel daunting

In the last decade, the technology landscape for U.S. K-12 schools has seen dramatic growth. The advancement in devices has allowed for an improved classroom experience, providing its schools with increased affordability, transportability, as well as innovative ways of learning through student-focused software. As an alternative to the typical computer lab set-up, more teachers now have the ability to engage their students in the classroom through one-to-one deployment. In order to grasp the volume of technology adoption in K-12 schools, a March 2017 IDC study (www.absolute.com/en/resources/analyst-reports/idc-student-technology-analytics) noted that the introduction of Chromebooks saw the U.S. notebook market increase in size from 1.8 million units in 2012 to 7.2 million units in 2015.

Rapid technology adoption in the classroom does not come without potential security risks that must be considered. First and foremost, K-12 schools need knowledgeable and trained administration and IT departments that can ensure each student and staff members’ online safety. As a fundamental step toward safeguarding sensitive school and student data, schools should set clear usage policies and strictly enforce compliance with them, as well as closely monitor how students and staff are utilizing new technology both on and off the network. With that being said, all parties need to work together to find a happy medium; establishing proper boundaries to ensure security and safety, while still allowing their students and staff enough freedom to learn and explore the curriculum.

Even with basic safety measures in place, the technical ability of K-12 students to override security ‘roadblocks’ is much more advanced than one would expect. If a school does not secure the endpoint devices themselves, students can and are surpassing the school’s proxy servers and firewalls on a daily basis. With the existence of very clear directions that can be accessed on websites like YouTube, it’s safe to say that students will bypass basic safety precautions. How you ask? I’ve personally seen students use everything from TeamViewer to VPNs. Even when faced with these challenges, it’s a school's responsibility to do everything in its power to ensure that children are unable to access non-sanctioned, often times, inappropriate materials on classroom-assigned devices. But for many districts, this comes down to technology budget allocation, which can often be a chicken or egg situation. Often times, the potential for a budget increase comes only by showcasing device safety, accountability of devices, as well as positive learning outcomes – an accomplishment which is hard to achieve without first investing in the right security software.  When schools finally have the resources to go beyond basic firewalls and proxy servers, it’s important they implement a higher level of security that sheds light on their ‘dark endpoints,’ meaning any device that has at-risk or proprietary data that organizations can’t identify or track. IT departments can eliminate many of the above-mentioned complications by closely monitoring any sort of action towards an override, suspicious traffic on the network, or device theft. 

While student and staff safety should always come first, as the adoption of new technology continues to explode among K-12 schools, there are many facets to consider when promoting successful technology adoption in the classroom. It’s easy to be overwhelmed by where to start.  I’ve mapped out the five key areas that K-12 schools should work into their budget and resources, as they become available.

 1. Asset management: Once devices are placed into the school environment, managing them can often become a complex chore for IT departments. With one-on-one mobile devices on the rise, the likelihood of theft has also increased, and it’s important for schools to be cognizant of investing in specialized technology to track device location. Being able to locate a lost or stolen device can help avoid the drawback of having to request a replacement budget, a consequence that indirectly hinders any software upgrades that can keep a school on the leading edge of technology and learning.  The most common instance of theft in a K-12 school occurs as a result of is (remove) students simply being too trustworthy of others, leaving their devices unattended -- whether that be at the gym, lunch, between classes, etc. Unfortunately, these devices are often sold for money by their peers on sites like eBay, OfferUp and Craigslist. While student theft is the most common hindrance, insider threat is not out of the picture. Though less frequent, my past investigations have shown that “lost devices” have also been known to fall into the hands of former IT contractors, substitutes, and relatives of employees.

2. Ensuring compliance: Whether K-12 schools receive monetary resources via state funding or from private funders like students’ parents, as is the case of many private schools, they need to institute compliance measures to show accountability for the amount of money provided towards technology advancements within the district. It’s important to note that compliance can mean many different things to an IT professional in education -- ranging from content filtering in accordance with new acts like CIPA, to following specific mandated rules when accessing federal funds. Regardless of the overseer, compliance is a hot topic among IT professionals and is an area where many would like to bring in security technology in order to make a more seamless process for tracking compliance.

3. Data security: With schools simultaneously deploying an increasing number of devices with varying usage, operating systems (Apple’s iOS, Google’s Android, Chrome, etc.), and allocated data storages, managing devices can become increasingly difficult. In many school cases across the country, protecting sensitive school and student data is an afterthought, meaning that everything from credit card numbers to health information and social security numbers is left vulnerable on insecure endpoints. According to Verizon’s 2016 Data Breach Investigations Report, the education sector ranked sixth overall in the U.S. for the total number of reported security incidents last year. With limited IT resources creating a lack of IT specific support, as well as a strict budget guideline towards advanced security measures, the K-12 system has become an easy target for cyber criminals looking to steal financial information.  The time and cost put towards the aftermath of a cyber-attack can be truly detrimental to a school’s IT budget for years to come.

4. Leveraging analytics: When it comes time to justify either consistent or increased school funding, the ability for K-12 schools to look at how their devices are being used by students and staff is crucial. Data collected across a district build a quantitative story; there are many metrics that should be scrutinized closely when identifying positive learning outcomes. Schools should analyze data sets that include: what applications are being used, where devices are being over and underutilized, and what is the impact of devices on learning outcomes, when compared to previous years without one-to-one deployment or new student-focused software, etc. This analysis can then go one step further -- comparing individual classrooms, grades, and neighboring districts to see where the new standard has been set for the coming year.

5. Digital Citizenship education: When providing students with individual devices, it’s important that schools also put time and money towards creating programs to educate their K-12 students on good Digital Citizenship, highlighting safety awareness, password protection, and appropriate usage. Students should learn about the implications of sharing passwords among their peers, as well as putting their personal information online. In the world of social media, cyberbullying must also be at the forefront of these educational and “no tolerance” programs. While implementing security software on devices can help minimize inappropriate interactions and messaging between students, through blocking access to social media application on school grounds, it’s important that staff also have a plan-of-action if a situation arises. To be successful, it's important to have teachers and administration on board with these best practices, as well as parents and other family members.   

While deploying, managing and securing devices in K-12 schools can often feel daunting at first, it’s important to remember that each step taken towards successful technology adoption in the classroom will bring school districts one step closer to safe school status with funding retention and improved academic performance.  It’s an investment that will certainly pay back in the long run.

About the Author: Harold L. Reaves is currently the Global Director for Safe Schools at Absolute Software, a Vancouver-based endpoint security company. Prior, Harold was the Director of Homeland Security for the City of Columbia, SC, where he managed Emergency Operations, the Bomb Squad, the Metropolitan Medical Response System, Public Safety Accreditation Unit, Community Safety and the Infrastructure Protection Plan. He holds a level five certification through the American Board of Certification for Homeland Security A.B.C.H.S. which is the highest attainable level.

Harold started his career with the U.S. Army stationed at Fort Polk, Louisiana, where he obtained the rank of Sergeant in 3 short years and then moved on to be a patrolman and Captain with the City of Columbia Police Department.