Mar 02 2017
Cloud

Planning for Security in the Cloud

Securing applications is top of mind for K–12 IT.

The best offense is a good defense, and the adage certainly applies when it comes to a one-to-one device program. Chromebooks or tablets can be stolen or lost, so it’s up to IT to do what it can to mitigate risk.

For instance, Valerie Truesdale, chief of technology, personalization and engagement for North Carolina’s Charlotte-Mecklenburg school system, says she teaches kids about keeping their devices safe, but she has another plan in place if all else fails. Truesdale employs the cloud-based Google Admin console feature that turns the Chromebook into a “dumb brick” as soon as it is reported missing. “It’s a powerful disincentive,” she says.

The same cloud-based management also lets Truesdale block apps and extensions and configure settings such as single sign-on. This means students can’t get to sites or use apps that are not vetted for school work.

“While we can customize screens for each child, we can also enforce policies across the entire learning environment,” Truesdale says.

Close

See How Your Peers Are Moving Forward in the Cloud

New research from CDW can help you build on your success and take the next step.