Follow us
Add us as a preferred source on Google
"For decades, bad actors have exploited computer systems by finding vulnerabilities in the systems themselves, but now, in a vast world of connected devices, users have become the soft underbelly of each organization, especially in educational communities."—Source: EdScoop
WHY THIS MATTERS:
Riddle me this: how do you keep research and digital communications open and accessibly while also protecting school's vulnerable data? Learn some top tips for human-centered data security from the University of Montana and other leaders in the field.
eduwire Newsletter
The smarter way to stay on top of the edtech industry. Sign up below.
TOPICS
MORE FROM EDUWIRE
