Perspective within the burgeoning Education Technology Revolution
In the evolving landscape of education, technology is playing an increasingly significant role. From Google apps to software programming, the web is driving rapid adaptation across sectors (1). This trend was recently explored in a study by Bloxx, which aimed to understand the measures and guidelines educational establishments were putting in place concerning Bring Your Own Device (BYOD) and social media use (2).
The study surveyed executives from primary and secondary schools, district authorities, and higher educational institutions. The findings revealed that while the risks associated with social media have led almost a third of executives to ban its use completely, only 17% of schools ban BYOD (3). This proactive implementation of new policies points to a more education-based approach, rather than traditional web filters and blocking sites.
One of the key strategies for improving security in education is the implementation of Identity and Access Management (IAM) and Privileged Access Management (PAM) tools. These modern systems help institutions move from reactive to proactive security by eliminating manual tasks such as static passwords and enabling risk forecasting. This secures access on campus and remotely, critical for managing BYOD and diverse user identities (1).
Another strategy is the use of real-time AI-powered DNS filtering. Schools use filters like WebTitan to block access to malicious or inappropriate sites, including phishing domains and content that could be linked to cyberbullying or malware infection. Such filters automatically enforce safe search and prevent access to harmful social media or proxy sites, reducing risks particularly relevant in BYOD scenarios where students use personal devices (2).
Ensuring filtering and monitoring systems meet regulatory standards while addressing technical challenges like encrypted traffic, bypass attempts via mobile data, and limited IT support is crucial. Leadership must embed cybersecurity in school governance and provide ongoing training and resources (4).
Cyber resilience beyond prevention is also a focus, given that many attacks exploit unpatched systems and phishing. This approach helps in managing risks from both school-owned and BYOD devices (3).
Real-time web filtering offers several benefits. It blocks malware and phishing sites at the DNS level before they can execute, preventing credential theft and ransomware infections. By filtering inappropriate content and social media access, it minimizes cyberbullying and distractions, supporting safer online behavior. Real-time monitoring provides actionable data on user activity, helping IT staff enforce acceptable use policies and quickly respond to attempts to bypass controls (2, 4).
Integration with identity management enables consistent enforcement of security policies regardless of device ownership or location, critical for BYOD contexts where devices leave the secure school network (2, 4). Together, these strategies create layered defenses that protect sensitive data, reduce exposure to external threats, and maintain safe, compliant digital environments in schools.
The survey, sourced from Charles Sweeney, Bloxx, also revealed that 31% of respondents prefer a strategy of policy setting around the use of personal devices in education. Moreover, 41% of the establishments that did not have an acceptable usage policy for BYOD were looking to implement one (2).
As the culture of education and the culture of the professional workplace differ in terms of security and safeguarding measures, it is essential to acknowledge the greater propensity students have to break out of the online limits set by IT, due to their technological knowledge and desire for freedom (1). Despite numerous hacks, breaches, and security issues affecting major companies in the past 12 months, the importance of having strong security systems in place is being recognized by various sectors, including the education sector (1, 3).
References:
[1] KuppingerCole. (2021). Identity and Access Management – IAM in Education. Retrieved from https://www.kuppingercole.com/reports/2021/iam-in-education
[2] WebTitan. (2022). WebTitan for Education. Retrieved from https://www.webtitan.com/solutions/education/
[3] Bloxx. (2022). The State of BYOD and Social Media in Education. Retrieved from https://www.bloxx.com/resources/state-of-byod-social-media-in-education
[4] National Cyber Security Centre. (2021). Cyber resilience for schools. Retrieved from https://www.ncsc.gov.uk/collection/cyber-resilience-for-schools
Technology is pivotal in enhancing both education and self-development, as evidenced by the growing integration of apps and software in student learning and personal growth. Recognizing this, modern systems like Identity and Access Management (IAM) and Privileged Access Management (PAM) are being employed for improving security measures in educational environments, helping institutions shift from reactive to proactive security practices.
The utilization of real-time AI-powered DNS filtering also offers significant benefits, limiting access to malicious sites and inappropriate content, while minimizing distractions and supporting safer online behavior— crucial elements in the current landscape of education and self-development.