December 29, 2021 By David Bisson 2 min read

Present Joe Biden signed the K-12 Cybersecurity Act into law, which lays out four objectives with the goal of strengthening the cybersecurity of the United States’ K-12 educational institutions. What do these mean for schools?

What is the K-12 Cybersecurity Act??

Introduced by U.S. Representative James R. Langevin (D-RI) as H.R.4691 in July, the K-12 Cybersecurity Act consists of four objectives.

The first aim is for the director of the Cybersecurity and Infrastructure Security Agency (CISA) to conduct a study on the cybersecurity risks confronting grades K-12 schools within 120 days of the act taking effect. As part of that study, CISA’s director will explore the challenges the education sector faces. These include securing information systems and protecting sensitive student and employee records, as well as putting cybersecurity protocols in place.

After completing the study and presenting their findings to Congress, the director will pursue the act’s second objective. CISA will publish guidelines that K-12 schools can follow to mitigate the digital risks confronting them.

Next, the director of CISA will use the survey’s findings and guidelines to develop an online training toolkit. The purpose of the resource will be to educate officials about best practices. In addition, it will provide officials with strategies that they can use to implement those guidelines.

The final objective of the K-12 Cybersecurity Act is for the director to make the findings of the study, the recommendations and the online training toolkit available to the public. They’ll be posted on the website of the Department of Homeland Security.

How to improve school cybersecurity today

As of this writing, CISA’s director still has several months to do this work. Some of those threats are already well-known, however. For instance, schools suffer from malware incidents and ransomware attacks. The logic here is that threat actors can steal K-12 schools’ data. With it, they can conduct follow-up attacks or monetize on the darknet.

Another issue with K-12 cybersecurity is that schools tend to lack cyber awareness and training. This makes it difficult for teachers and administrators to follow best practices (let alone know about them). This is even more true in an age of remote learning.

Therefore, K-12 schools can defend themselves against some of the threats discussed above by creating a security awareness training program. This program should use education modules to make people more familiar with the threats confronting them.

K-12 schools can complement those human controls with technical security measures. For example, use log monitoring and management to gain visibility over potential threats. In addition, use data backups to strengthen schools’ defenses against data destruction events such as ransomware. While the K-12 Cybersecurity Act has yet to show findings, these steps will help prepare and protect kids’ information in the meantime.

More from News

We are moving!

< 1 min read - SecurityIntelligence.com is being sunset, but have no fear!We have a new home for all of your favorite security and X-Force content.Follow us to www.ibm.com/think to maintain access to the stories and news you love, both new and old.Security Intelligence will officially sunset on Friday, March 28, 2025. To access the latest security thought leadership, go here. To access the latest X-Force research, go here.If you are experiencing cybersecurity issues or an incident, contact X-Force® to help:US hotline: 1-888-241-9812 | Global hotline:…

FYSA — VMware Critical Vulnerabilities Patched

< 1 min read - SummaryBroadcom has released a security bulletin, VMSA-2025-0004, addressing and remediating three vulnerabilities that, if exploited, could lead to system compromise. Products affected include vCenter Server, vRealize Operations Manager, and vCloud Director.Threat TopographyThreat Type: Critical VulnerabilitiesIndustry: VirtualizationGeolocation: GlobalOverviewX-Force Incident Command is monitoring activity surrounding Broadcom’s Security Bulletin (VMSA-2025-0004) for three potentially critical vulnerabilities in VMware products. These vulnerabilities, identified as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, have reportedly been exploited in attacks. X-Force has not been able to validate those claims. The vulnerabilities…

Insights from CISA’s red team findings and the evolution of EDR

3 min read - A recent CISA red team assessment of a United States critical infrastructure organization revealed systemic vulnerabilities in modern cybersecurity. Among the most pressing issues was a heavy reliance on endpoint detection and response (EDR) solutions, paired with a lack of network-level protections. These findings underscore a familiar challenge: Why do organizations place so much trust in EDR alone, and what must change to address its shortcomings? EDR’s double-edged sword A cornerstone of cyber resilience strategy, EDR solutions are prized for…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today