As educational professionals, we have unusual access to computer systems and data. We are likely to be users of many computing devices. At work, you have classroom computers, computer rooms, library computers, and mobile devices that you and those around you use. These are the devices that are most tightly secured. There are sophisticated firewalls, threat detection tools, anti-malware software, backup plans, and other tools—very expensive tools—that have been configured by experts.
They are also the computers that can cause the most damage if compromised. A computer virus that finds its way on to a local area network may quickly spread to every other computer on the network. Those computers also contain connections to all of the data systems that are vital to the school; student data, financial records, even building controls such as heating ventilation, and air conditioning as well as locks and other security systems are often connected to the same network switches, routers, and other network infrastructure as user devices.
Because of these many connections, it is important that all users in a school setting understand and follow the procedures intended to maintain network security. Of course, It professionals must ensure the procedures are easy to follow and are clearly communicated, but users must pay attention to the trainings, understand what they should, and ask for clarification if needed.
Adults working in schools have a further responsibility to model network security and actively monitor students’ activity while on networks, and actively teach network security.
In the decades I have been working with computers and students, I have found that students are very content following reasonable rules about computing that are well-explained to them. Explaining the potential threats is more effective than punishments when adults want to promote network security.