78

Step 1 of 5

  • Tech Reformers Risk Assessment Powered by S2

    Tech Reformers shares this risk assessment as an opportunity for education organizations to conduct a preliminary self-evaluation of their cybersecurity risk and does not constitute an endorsement of a specific vendor or product.

    This assessment is free and vendor-neutral. Unlike traditional industry risk assessments, it incorporates topics specific to the K12 environment such as educational technology and remote learning. Additionally, the tool itself is designed as an educational tool. Each question is paired with a user-friendly explanation to clearly explain the question being asked.

  • Hidden
  • Hidden
  • When selecting your size please consider volunteers and student tech teams that are assisting with District technology operations.
    A specific line item in the budget for cyber/info security can help you manage spend as well as giving visibility to District leadership.
    Security event is defined as any unauthorized access or attempted access of District data or systems. Data breach is a specific type of security event were District data of an amount defined by federal or state laws was lost or stolen, data breach is a legal term and should not be used to refer to any other type of security event. DDOS is short for Distributed Denial of Service, this is type of security event were the network or systems become overwhelmed with to many requests and stop responding rendering the network or system unusable. Ransomware is a specific type of malware that makes files and or systems inaccessible and unusable, generally this is accompanied by a demand for payment from the cyber-criminals to release your information back to you. Malware is computer code or programs that perform unauthorized activity.
    An external vulnerability assessment is a specific type of security assessment that looks at the public / internet facing networks and systems to check for any known risks / vulnerabilities that could be exploited by a cyber-criminal to cause disruption or steal information.
    An internal vulnerability assessment is a specific type of security assessment that looks at the private/ internal facing networks and systems to check for any known risks / vulnerabilities that could be exploited by a cyber-criminal to cause disruption or steal information.