Skip Ribbon Commands
Skip to main content

 Information Security

​​​​​​​​As the number of cybersecurity attacks are continuing to increase within the K-12 education environment, information security response planning has become an important component within information technology.    Information Security is defined as the practice of protecting information by mitigating information risks. It typically involves preventing, or at least reducing, the probability of unauthorized access to data, or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording or devaluation of information. It also involves actions intended to reduce the adverse impacts of such incidents. 

Incidence Response Planning

As cybersecurity attacks become more numerous, having an incidence response plan can help with rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited, and restoring IT services. The National institute of Standards and Technology (NIST) of the U. S. Department of Commerce has developed the Computer Security Incident Handling Guide as a resource for creating an incidence response plan.  Additional resources for creating an incidence response plan for your school or district can be found in the Incidence Response Planning Resource section.

October is National Cybersecurity Awareness Month (NCSAM).  NCSAM raises awareness about the importance of cybersecurity across our nation.  For additional information on the various types of cybercrimes and why you should care, please view the National Cybersecurity Awareness Month presentation. 
Please visit this site frequently as we will be adding Tip Sheets on how you can reduce cybersecurity risks and protect yourself online.  Please feel free to share with others. 

 Contact Information

​​Nathan Miller
Chief Information Security Officer​​

 Cybersecurity Awareness

National Cybersecurity Awareness Month 2020 Presentation
Please view this presentation as it helps in understanding the various types of cyber crimes and why you should care.