Information Technology

Information, news and features for the education sector IT professionals


image shows to configurations of the new Eaton G3 Universal Input Rack PDU and THE Journal logo

Eaton Debuts G3 Universal Input Rack PDU Outlet with Metering, Monitoring, Switching

Power management provider Eaton has introduced a G3 Universal Input Rack PDU with dynamic C39 outlets, adaptable to a wide variety of plugs, input cords, and voltage requirements, according to a news release.

LG Debuts Ultra Wide ProBeam 4K Laser Projector with Up to 285-Inch Image

To address a growing demand for ultra-wide conferencing projection, LG Business Solutions USA has debuted a new 4K UHD laser projector with 21:9 aspect ratio support with “maximum visibility” for conferencing apps and presentations, according to a news release.

Image reads Proofpoint 2023 Voice of the CISO

Two-Thirds of U.S. Education CISOs See Material Cyber Attack as Likely in Next 12 Months

Nearly two-thirds of chief information security officers in the U.S. education sector believe they’re likely to experience a material cyber attack in the next 12 months, and 62% have dealt with a material loss of sensitive information in the past 12 months, according to the newest Voice of the CISO report published this week by cybersecurity company Proofpoint.

K–12 IT Pros See Careless Insiders and Foreign Governments as Top Security Threats

A new survey of public sector IT professionals finds that the biggest data security threats come from a wide range of sources, from simple carelessness to intentional hacking from foreign governments.

Why Educational Institutions are Prone to Ransomware Attacks (and What They Can Do to Protect Themselves)

Ransomware is the most significant cyber threat in the education sector, and K–12 schools and colleges and universities are both targets.

VHS Learning Adds Chinese Language and Culture Course for High Schoolers

As China becomes an increasingly important player in international business, politics, technology, and diplomacy, virtual instruction provider VHS Learning has added a Chinese Language and Culture introductory course, open to high school students nationwide either through their school or through independent study, according to a news release.

image shows a TV used as digital signage, a TV used as an interactive classroom display using wireless screen sharing, and a large TV used as an interactive display in a meeting room at warren county public schools in Kentucky

District Rolls Out Wireless Digital Signage to 1,200 Screens

Warren County (Kentucky) Public Schools’ recent transition to the Airtame platform has enabled seamless wireless screen-sharing and digital signage capabilities for the district’s 1,200 TVs across 35 buildings, freeing teachers to move around classrooms and simplifying educator control of sharing features, according to a new use study released by Airtame.

Digital Transformation Survey

Call for Participation: 2023 Digital Transformation Survey

THE Journal's inaugural Digital Transformation Survey will provide valuable benchmarking data on the state of digital transformation in education and the progress schools are making moving forward.

Photo representing ransomware with THE Journal logo

Ransomware Gang Claims Edison Learning Data Theft

The Royal Ransomware is claiming to have infiltrated public school management and virtual learning provider Edison Learning, posting on its dark web data leak site on Wednesday, April 26, that it had stolen 20GB of the company’s data “including personal information of employees and students” and threatening to post the data “early next week.”

text reads Ransomware Vulnerability Warning Pilot next to CISA logo

CISA Offers Ransomware Vulnerability Warning Notifications to Help Avoid Cyber Incidents

The federal Cybersecurity and Infrastructure Security Agency is encouraging public sector and critical infrastructure organizations to enroll in its new Ransomware Vulnerability Warning Pilot program to receive notifications anytime a new relevant vulnerability being exploited by threat actors is identified.