• Skip to main content

VSTE

Virginia Society for Technology in Education

  • About
    • About VSTE
    • Committees
      • Advocacy
      • Awards
      • Education
      • Elections
      • Equity & Diversity
      • Finance
      • Outreach
    • Get Involved
    • Leadership
    • VSTE Corporate Council
  • Blog
  • Events
    • VSTE Calendar
    • Annual Conference
    • Annual Conference Archives
    • The Leading Ed Forum 2025
    • Power of Coaching 2025
    • Corporate and Conference Sponsorship Opportunities
  • Prof. Services
  • VCC
  • #VSTE25
  • Membership
    • Subscribe/Join
  • Contact
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Search

timstahmer

Mitigate Risks With This Cloud Application Security Checklist

March 8, 2021 by timstahmer

Using Google G Suite and Microsoft Office 365 provides school districts with many benefits. From improving productivity and collaboration to outsourcing infrastructure security, schools and districts of sizes are making the move to the cloud.

But there are security issues in cloud computing. The NIST Cybersecurity Framework recommends that you run a risk assessment and cloud security audit regularly. This cloud application security checklist is designed to help you run such an audit for your district’s G Suite and Office 365 to mitigate security issues.

10 Step Cloud Application Security Audit Checklist

What is cloud application security? It is a series of defined policies, processes, controls, and technology governing all information exchanges that happen in collaborative cloud Software as a Service (SaaS) applications like Microsoft Office 365 and Google G Suite.

As your school district moves more information and activity to the cloud, your perimeter security safeguards become less effective. More IT and security professionals are opting to secure cloud storage by deploying a zero trust security model. This checklist also helps you lay the groundwork for deploying zero trust security for your district’s cloud applications.

1. Set password policies

Passwords are the foundation of any good security plan. Educate both students and staff on what factors make passwords strong or weak, and why password strength is so important.

As a system admin, you can set policies and standards for your district’s cloud app passwords. At a minimum, you should enable your system’s “require a strong password” feature. You can also set minimum and maximum password lengths, password expiration, and more.

If you’re setting the standards for the first time, be sure to run a check of current passwords to see whose passwords are out of compliance with the new standards. You can then force a password change through your admin console.

2. Make multi-factor authentication mandatory

Multi-factor authentication requires users to take a second step, after entering the correct password, to prove they have authorized access. This typically includes entering a code that is sent to their phone via SMS. It can also include phone calls, answering security questions, mobile app prompts, and more.

3. Manage SaaS access and permissions

Open Authorization (OAuth) makes app use convenient for end-users, but it can be a little bit of a nightmare for those in charge of IT security. The proliferation of SaaS use in classrooms and throughout school districts makes it difficult to stay on top of what apps have access to your cloud environment, what permissions are granted to them, and how secure the app is itself.

District system admins have the ability to control what apps are allowed permissions to the company’s Google or Microsoft cloud accounts. This can be as simple as restricting access to risky apps, or as customized and detailed as creating sanctioned and unsanctioned apps lists.

4. Enable anti-phishing protections

Email phishing is still the most common external threat vector. And there is a myriad of tools on the market aimed at removing phishing emails from inboxes. Unfortunately, none of them work with 100% accuracy.

The best option is to start with configuring your native cloud email provider’s anti-phishing capabilities and then layer additional safeguards and monitors on top of it. Educating the rest of your district about common phishing attacks, new ones as they arise, and how to spot them is also extremely important.

5. Turn on unintended external reply warning

One of the ways you can ensure that sensitive, internal information isn’t improperly shared outside of the school district is to enable an external reply warning. This feature also protects your district against forged emails from malicious hackers trying to gain access to internal files and information.

When the external reply warning is enabled, users receive a pop-up notification asking if they’re sure they want to send it to an external domain. It’s important to reinforce to your colleagues why they need to pay attention to this pop-up and think twice before dismissing it.

6. Set external sharing standards

Beyond sending emails, you should configure data loss prevention external sharing standards for shared calendars, drives, folders, and files. The best approach is to start with the most strict standards possible, and then open up as needed.

Files and folders containing the most sensitive information such as student, parent/guardian, and staff personally identifiable and financial information, should rarely (if ever) be configured to allow external sharing and access.

7. Set up message encryption

Encryption prevents anyone other than the intended audience from viewing a message. Microsoft and Google provide native encryption options. In Google’s case, they provide “Confidential Mode”, which works a little differently. There are also a variety of third party encryption tools available.

Sending sensitive or confidential information via email should always have encryption and confidential protections enabled. It forces the recipient to authenticate that they are the intended audience and protects the information from being forwarded to others. The sender can also set up an expiration date to ensure the information isn’t lingering in someone’s inbox into eternity.

8. Set up data loss prevention policies

Fundamentally, data loss prevention is a strategy to ensure that your district’s sensitive and protected information does not inadvertently leave the network—whether it’s accidental or malicious.

System admins have the ability to set up data loss prevention policies in most popular and “enterprise-level” cloud applications. These policies help admins maintain and automate rules around how information can be accessed and shared. Most policies create alerts and actions that the system can take if a data loss prevention policy is broken. For example, if an employee account is trying to share a spreadsheet containing social security numbers with an outside domain, the policy can be set up to automatically warn the user and/or quarantine the file.

9. Enable mobile management

Everyone in your school district likely uses mobile devices to access school cloud accounts—mainly email, files, and drives. These mobile devices represent more endpoints that need to be secured by IT. But, endpoint security isn’t enough in cloud computing security. You will also need to configure mobile device policies in your cloud applications.

10. Run a security health/score audit

Once you’ve completed this checklist, it’s a good idea to run a cloud security audit of your environment. An audit will re-check for any configuration errors, sharing risks, files containing sensitive information, and more.

It’s also important to run an audit on a periodic basis. Weekly and/or monthly audits and reports can be automated and provide you with detailed information into the security health of your cloud applications. Microsoft provides Office 365 Secure Score, which is very helpful in providing on-going health checks and recommendations. Particularly as new security features are rolled out and new risks are identified.

If your school district uses SaaS applications such as G Suite and/or Office 365, cloud application security is a critical layer in your cybersecurity infrastructure. Without it, monitoring and controlling behavior happening within applications are impossible. This blind spot creates critical vulnerabilities in your district stakeholders’ sensitive information and financial futures.


Written by Katie Fritchen. This material is provided by VSTE partner Managed Methods. For more information, visit their website.

Share this:

  • Click to email a link to a friend (Opens in new window) Email
  • Tweet

Filed Under: Front Page Bottom, VSTE Partners Tagged With: administration, cybersecurity, sponsor, vendor

Webinar: Being the Calm in The Storm

March 3, 2021 by timstahmer

In the first of two March 2021 editions of the VSTE Diversity, Equity, and Inclusion Webinar, Amy Jackson discusses how to maintain calm, transparency, and control during times of technological difficulties. Amy currently works for a small school district in Central Virginia and is the co-chair of the VSTE Diversity, Equity, and Inclusion committee.

The webinar is hosted by Charles Randolph.

Our next edition will be on Wednesday, March 17 at 12:30.

Share this:

  • Click to email a link to a friend (Opens in new window) Email
  • Tweet

Filed Under: Blog, Events, Front Page Middle, Online Events, VSTE Voices Tagged With: diversity, Equity, inclusion, Webinar

Webinar: Incorporating Diversity and Equity Principles Into Learning Content

February 25, 2021 by timstahmer

In the February 2021 edition of the VSTE Diversity, Equity, and Inclusion Webinar, Charlotte Morris talks about how educators can include diversity and equity principles in their learning content. Charlotte is an instructional designer of graduate courses in the College of Professional Studies at George Washington University.

The webinar is hosted by Charles Randolph.

Share this:

  • Click to email a link to a friend (Opens in new window) Email
  • Tweet

Filed Under: Blog, Events, Front Page Middle, Online Events, VSTE Voices Tagged With: content, diversity, Equity, inclusion, learning, Webinar

Webinar: Incorporating Diversity and Equity Principles

February 23, 2021 by timstahmer

Tomorrow, February 24, at 12:30 pm the VSTE Diversity, Equity, and Inclusion Committee will host a webinar on incorporating Diversity and Equity principles in your learning content. One of our mentors, Charolette Morris, will facilitate this webinar.

In this webinar, you’ll learn about:

  • The importance of incorporating D&I in learning content.
  • Examples of how to apply D&I in your learning content.
  • Common D&I Terms

Charlotte Morris is an Instructional Designer with the College of Professional Studies at The George Washington University. Join us at 12:30 tomorrow as she shares insight into how to incorporate Diversity & Inclusion (D&I) principles in your learning content.

If you would like to attend this webinar, email vstedei@vste.org to receive a link to the Zoom room.

Share this:

  • Click to email a link to a friend (Opens in new window) Email
  • Tweet

Filed Under: Blog, Events, Online Events, VSTE News Tagged With: diversity, Equity, inclusion, Webinar

Elevating Collaboration With Jamboard

February 22, 2021 by timstahmer

As teachers have adjusted to virtual and hybrid learning one of the tools that has risen to the surface has been Google Jamboard. Jamboard is an interactive whiteboard application that, like most Google products, is collaborative. Our principal, Leeane Turnbull-Palette, began using Jamboards in conjunction with inclusive opener prompts to begin staff meetings and many in our staff, at Salem High School in Virginia Beach, loved the collaborative nature and ease of use. One of the biggest highlights of the tool is that you can use an image as the background making any whiteboard a graphic organizer.

Jamboard has been a versatile tool for inclusive openings, collaborative groups, intentional closings, and advisory activities. It allows teachers to set up prompts, embed graphic organizers into the background, and gives teachers options on how they are going to have students respond. For inclusive openings, the teacher may post a prompt and all students can answer that prompt simultaneously regardless of where they are. As the class moves into classwork, the teacher can assign 1 page of a Jamboard to each of the 5 groups with a graphic organizer embedded onto the slide. Jamboards will allow for up to 20 pages per Jamboard which allows for a lot of versatility, not to mention all of the students' work for the day is neatly on one Jamboard for easy grading.

Recently when using Jamboard for a professional development course, teachers were asked to note on a Jamboard what new tools or strategies they implemented during the first term of virtual learning during the pandemic that was a game-changer. They each noted their tool or strategy and signed their name to their sticky note on the Jamboard. Next, the teachers were asked to think about what they’d like to change to make the next term run a bit more smoothly for them or their students.

Graphic showing Jamboard examples

On the next Jamboard slide the teachers were asked to write on a sticky note what tool or strategy they wanted to try for the second term to help with their challenge, again they were asked to sign their name. In conclusion, teachers were asked to “ask the experts”, their colleagues who may have already used that tool of strategies for tips and points on where to get started. The Jamboard was their take away with tons of tools and methods that had worked for their peers as well as a point of contact to reach out to.

Another great example of how teachers are using Jamboard is how the catering teacher, Chef Voloudakis, is integrating them into class and creating a culture of collaboration and inclusion in her virtual classroom. Teaching a cooking class virtual was quite a challenge in the beginning. She uses Jamboards in a variety of ways. One way is to share thoughts and options on different foods. During Thanksgiving, students were able to share recipes, traditions, even photographs of dishes they help create with their families for the holiday meal. Another way they are using them is a brainstorming sounding board while discussing dishing as alternative ingredients. Lastly, Jamboards have become the classroom’s virtual bulletin board where students and Chef V can post pictures and video demonstrations of how to create a dish as well as the final products.

This pandemic has been a challenge for everyone. However, teachers are thinking outside of the box, sharing ideas, using new tools, and creating new classroom experiences that may not look like they did in the past, but are equally as rich and meaningful.


Written by Jennifer Blais. Jennifer is an Instructional Technology Specialist at Green Run High School and Salem High School in Virginia Beach. You can follow her on Twitter @MsJenBlais.

Share this:

  • Click to email a link to a friend (Opens in new window) Email
  • Tweet

Filed Under: Blog, Front Page Middle, VSTE Voices Tagged With: collaboration, examples, jamboard

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 7
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Interim pages omitted …
  • Page 35
  • Go to Next Page »
  • About
  • Blog
  • Events
  • Prof. Services
  • VCC
  • #VSTE25
  • Membership
  • Contact
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Search

Support

Copyright © 2025 Virginia Society for Technology in Education · Log in