
Conscientious school and college boards are moving cyber risk management to the rank of a board-level priority. Since the Covid-19 pandemic brought attention to new risks associated with virtual board meetings and remote work, responsible school boards should get serious about implementing a cyber risk framework that bolsters their cyber defenses. But where to begin? Suites of costly consultants stand at the ready to guide you through the process, but few school or community college boards can afford them. Even for-profit sectors have stopped short of full implementation as consultants walk them through such popular schema as the National Institute of Standards and Technology (NIST)'s Cybersecurity Framework (a.k.a., CSF). More than 50% of respondents to a 300-person, multi-industry survey by Tenable, Inc. cited cost as the prohibitive barrier to completing the processes dictated by CSF. Using top board portal software, a school or college board can apply the principles underlying such lauded protocols to its own cyber risk framework, creating a repeatable, adaptable series of actions to stay a step ahead of hackers:
Leveraging the capacities of top board management software, a school board's cyber risk framework can customize those measures as follows:
If you asked any school board member just how securely board business is protected from cybercriminals, you would undoubtedly elicit a blank stare. If you don't know how bad the problem is, there is no way to address it. Conducting a security audit is therefore a non-negotiable first step. Not just any technology professional is qualified to conduct such an audit. The complexity of the job calls for an IS or IT executive ' perhaps the CIO or a member of the Risk Committee. Some outside consultants also have the credentials required. Many states and state school board associations offer grants to offset the cost of a high-level risk audit. Some school boards tap state and regional networks to share costs with peer districts. The audit should cover more than penetration testing of hardware. Since human error causes more data leaks than any other source, the auditors should also spend time monitoring board communication habits. If the board makes common mistakes like attaching sensitive documents to emails, they can eradicate that considerable risk by directing the board to store and edit documents through the secure board portal. The gap analysis will result in an objective report of present cybersecurity vulnerabilities that keep the board from attaining a targeted risk profile. 'Reducing cyber risk' ceases to be a vague and impossible imperative. Even if the gap is large, it becomes a known quantity, the kind that can actually be addressed.
No single act ' not even banning board emails ' suffices to bring a school board to a tolerable level of cyber risk exposure. Depending on a district's previous adoption of best practices, the list of actions that must be taken will include some or all of the following:
One board member should shepherd all these processes through the many steps to full implementation, even if various stages of implementation are delegated to others. Not all measures can be taken at once. The board should create a road map of when and how each needed step will be completed. To keep the board accountable, a part of each school board meeting should be devoted to a cybersecurity update that reports on adherence to the plan. With a fully secure board portal like Diligent Community, school boards can reduce their cyber risk with a rigorous framework of measurements and corrections. It doesn't take a rocket scientist, but it does take a bold plan, consultation with experts and strong leadership.