A daily selection of features, industry news, and analysis for AV/IT professionals. Sign up below.
You are now subscribed
Your newsletter sign-up was successful
"For decades, bad actors have exploited computer systems by finding vulnerabilities in the systems themselves, but now, in a vast world of connected devices, users have become the soft underbelly of each organization, especially in educational communities."—Source: EdScoop
WHY THIS MATTERS:
Article continues belowRiddle me this: how do you keep research and digital communications open and accessibly while also protecting school's vulnerable data? Learn some top tips for human-centered data security from the University of Montana and other leaders in the field.
The smarter way to stay on top of the edtech industry. Sign up below.
