Cybersecurity in Remote Learning: Considerations for Educational Institutions

Whitepapers

Cybersecurity in Remote Learning: Considerations for Educational Institutions

Heimdal Logo

Date: 10-01-2021

10 min read

linkedIn Logo

Alina Georgiana Petcu

Category: cybersecurity-best-practices

OVERVIEW

Cybersecurity in Remote Learning: Considerations for Educational Institutions

As distance learning is still pivotal to education continuity in the school year 2020-21 while the COVID-19 pandemic endures, educational institutions worldwide battle increasingly difficult online threats. The novel challenges posed by remote lessons enhance the cybersecurity gaps in this field that has been infamously lackluster in the IT department for decades now.

You May Also Like

cybersecurity-best-practices

Date: 10-01-2021

A whitepaper aiming to cast some light on the intricacies and cybersecurity challenges posed by Bring-Your-Own-Device (BYOD) policies in companies.

Author Elena Georgescu

Read it...

cybersecurity-best-practices

Date: 10-01-2021

A thorough exploration of the specific cybersecurity threats that universities and educational institutions are facing and tips on how to effectively combat them.

Author Alina Georgiana Petcu

Read it...

cybersecurity-best-practices

Date: 10-09-2020

An essential guide for all small and medium business owners and employees, detailing obligatory security measures, tips and methods for ensuring digital safety.

Author Bianca Soare

Read it...

cybersecurity-forensics

Date: 10-09-2020

A technical case study focusing on multi-process malware (MPM), what it is and how it circumvents usual cyber-defense detection methods.

Author Vladimir Unterfingher

Read it...

About the Author

Author Photo
linkedIn Logo
Alina Georgiana Petcu

PR and Communication Officer

Alina Georgiana Petcu is a cybersecurity specialist within Heimdal™ Security and her main interest lies in institutional cybersecurity. In her spare time, Alina is also an avid malware historian who loves nothing more than to untangle the intricate narratives behind the world's most infamous cyberattacks.

View all posts