[vc_row full_width=”stretch_row_content_no_spaces” video_bg=”yes” video_bg_url=”https://www.youtube.com/watch?v=mlNT2BbVdtk” kd_image_overlay_color=”rgba(0,0,0,0.7)” kd_image_overlay=”true” css=”.vc_custom_1556020335788{padding-top: 250px !important;padding-bottom: 180px !important;background: #1a1a1a url(https://www.ekko-wp.com/wp-content/uploads/2018/10/blog3.jpg?id=7320) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_row_inner el_class=”container” css=”.vc_custom_1540217256024{margin-bottom: 30px !important;}”][vc_column_inner width=”1/4″][/vc_column_inner][vc_column_inner width=”1/2″][tek_sectiontitle st_title=”Admin Portal `{`Debug`}`” st_title_tag=”h1″ st_subtitle_tag=”” st_subtitle_decoration=”” st_title_color=”#ffffff” st_subtitle_color=”#eeeeee” st_separator_enable=”separator_off” st_text_align=”text-center” st_width=”st_fullwidth” css_animation=”kd-animated fadeIn” css_animation_delay=”200″][vc_empty_space height=”20px”][/vc_column_inner][vc_column_inner width=”1/4″][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1555681647238{padding-top: 100px !important;padding-bottom: 50px !important;background-color: #f5f5f5 !important;}”][vc_column css=”.vc_custom_1542978138363{padding-right: 0px !important;padding-left: 0px !important;}”][vc_row_inner css=”.vc_custom_1556020322596{margin-bottom: 20px !important;padding-right: 0px !important;padding-left: 0px !important;}”][vc_column_inner width=”1/3″][tek_contentbox cb_title=”Knowledge Base” cb_content_text=”Lorem ipsum dolor sit amet, consectetur adipisicing elit. Lorem ipsum dolor sit amet.” icon_type=”icon_browser” cb_content_alignment=”cb-cont-left” cb_custom_link=”#” background_type=”none” css_animation=”kd-animated fadeInUp” elem_animation_delay=”” icon_iconsmind=”iconsmind-Book”][/vc_column_inner][vc_column_inner width=”1/3″][tek_contentbox cb_title=”Video Tutorials” cb_content_text=”Lorem ipsum dolor sit amet, consectetur adipisicing elit. Lorem ipsum dolor sit amet.” icon_type=”icon_browser” cb_content_alignment=”cb-cont-left” cb_custom_link=”#” background_type=”none” css_animation=”kd-animated fadeInUp” elem_animation_delay=”200″ icon_iconsmind=”iconsmind-Video-5″][/vc_column_inner][vc_column_inner width=”1/3″][tek_contentbox cb_title=”Customer Support” cb_content_text=”Lorem ipsum dolor sit amet, consectetur adipisicing elit. Lorem ipsum dolor sit amet.” icon_type=”icon_browser” cb_content_alignment=”cb-cont-left” cb_custom_link=”#” background_type=”none” css_animation=”kd-animated fadeInUp” elem_animation_delay=”400″ icon_iconsmind=”iconsmind-Support”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1515751968085{padding-top: 100px !important;}”][vc_column css=”.vc_custom_1515752234075{padding-right: 0px !important;padding-left: 0px !important;}”][vc_row_inner][vc_column_inner][tek_sectiontitle st_title=”Cyber attacks on the K-12 system are rapidly increasing!” st_title_tag=”” st_subtitle=”While legislation continues to progress at the federal and state level, most of the legislation provides general requirements without actionable activities or are not designed with an understanding of the constraints facing K-12.

Rapidly evolving environmental shifts continue to test the resilience and preparedness of districts to respond to changes with little, or no notice. These issues are compounded by a lack of visibility and governance around cybersecurity programs. Some estimates have the increase in Cyber incidents increasing by 86% this academic year (EdScoop Article).” st_subtitle_tag=”” st_subtitle_decoration=”” st_separator_enable=”separator_off” st_text_align=”text-center” st_width=”st_fullwidth” css_animation=”kd-animated fadeIn” css_animation_delay=”200″ css=”.vc_custom_1643356450967{margin-bottom: 45px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner gap=”30″ css=”.vc_custom_1555681526039{padding-bottom: 85px !important;}”][vc_column_inner css=”.vc_custom_1541160549301{padding-right: 0px !important;padding-left: 0px !important;}” offset=”vc_col-lg-6″][vc_toggle title=”No Visibility” css_animation=”none”]Most school boards and leadership teams have never had access to the tools needed to effectively address cyber risk and continue to operate in a reactive and tactical nature. Unfortunately, bad actors also know this and use this to gain access to…[/vc_toggle][vc_toggle title=”Limited Resources”]The K-12 system has significant constraints in both cybersecurity skills and funding. The high cost of cybersecurity solutions, increasing regulations, and lack of cyber skills results in self-disqualification from practicing standard cybersecurity hygiene. This economic and resource reality has left the K-12 system, boards, and leader exposed to threats that go beyond technical risk and can become a legal risk for the district and leadership.[/vc_toggle][vc_toggle title=”Unknown Threats”]It is clear to most leaders in K-12 that technical risk is increasing with the digitization of education and collaborative platforms. The threat of Ransomware, Phishing, and Distributed Denial of Service (DDoS) are clear and present dangers for most districts daily. What has gone unnoticed are the increasing threats associated with the operational side of education. As we see increasing cyber insurance premiums and loss of coverage due to the inability to prove control over the environment and ransoms being paid, school systems are facing new financial risks.[/vc_toggle][vc_toggle title=”Budget Optimization”]Tincidunt elit magnis nulla facilisis. Dolor sagittis maecenas. Sapien nunc amet ultrices, dolores sit ipsum velit purus aliquet, massa fringilla leo orci.[/vc_toggle][/vc_column_inner][vc_column_inner css=”.vc_custom_1541160556700{padding-right: 0px !important;padding-left: 0px !important;}” offset=”vc_col-lg-6″][vc_toggle title=”Unintended Results of Regulation” css_animation=”none”]Most in the cyber community see regulation as far overdue. The problem with this belief is that most in the cyber community also assume that regulations come with the associated funding. In fact, most cyber regulations end up as self-funded legislation under the assumption that best practices should be followed and are assumed in the current IT budgets. These unfunded federal and state regulations have the unintended consequence of either materially increasing the workload of the IT staff, or shifting liability down to the local school systems, leaving them exposed.[/vc_toggle][vc_toggle title=”Real-time Visibility”]Tincidunt elit magnis nulla facilisis. Dolor sagittis maecenas. Sapien nunc amet ultrices, dolores sit ipsum velit purus aliquet, massa fringilla leo orci.[/vc_toggle][vc_toggle title=”IT Risk Identification”]Tincidunt elit magnis nulla facilisis. Dolor sagittis maecenas. Sapien nunc amet ultrices, dolores sit ipsum velit purus aliquet, massa fringilla leo orci.[/vc_toggle][vc_toggle title=”Compliance”]Tincidunt elit magnis nulla facilisis. Dolor sagittis maecenas. Sapien nunc amet ultrices, dolores sit ipsum velit purus aliquet, massa fringilla leo orci.[/vc_toggle][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]