Information Technology

Information, news and features for the education sector IT professionals


Call for Participation: IT Salary and Job Satisfaction Survey

THE Journal is relaunching its K–12 IT Salary and Job Satisfaction Survey. To date, thousands of K–12 IT professionals have participated, providing valuable insights into the profession for their peers and colleagues.

Image says DMARC Guide for Education IT Staff with THE Journal logo

DMARC Study of Education Domains Warns of Widespread Vulnerabilities due to Email Security Settings

New research shows that an overwhelming majority of education institutions in the United States have incorrectly configured email security settings and as a result are more susceptible to phishing and spoofing threats.

'Unsustainable Levels of Stress' Will Push IT Security Leaders into New Roles

Within two years, half of information security professionals across all sectors will leave their current positions, and half of those will find themselves in completely different roles.

image text reads Threat Report Uncover Student-Targeted Phishing Attacks with Identity Automation logo and PIXM logo

Report Details Increasingly Sophisticated Phishing Attacks and Proxies Targeting Students

In a monthlong study of one U.S. school district with newly implemented PhishID security software, Identity Automation uncovered detailed markers of increasingly sophisticated phishing attacks and dangerous proxy services targeting students, according to a new report out from Identity Automation.

Lenovo logo over a photo of a male student and a male teacher looking closely at a touch-screen Chromebook

Lenovo Rolls Out New Edu Laptops and Chromebooks, Introduces Devices-as-a-Service Solution

Lenovo has revamped its education technology portfolio, recently introducing new Windows 11 and ChromeOS laptops, new features for its VR Classroom and LanSchool solutions, and a new device-as-a-service option for K–12 schools.

image shows a Pivot Interactives digital science experiment with a runner going uphill and measuring ruler overlaid

The Best Ed Tech Innovations Will Be Emergent – If We Do This Right

Without minimizing the need to honor students’ privacy rights, we as an ed tech community should also not miss the opportunity to search for the new emergent patterns that will no doubt appear when we look at how students, teachers, and their data all interact. It’s these new patterns, like ripples in the sand, that will likely offer insights into the heretofore most intractable questions in education.

image shows stacks of old laptops in various states of disrepair

Got Chromebooks? First Steps to Securely and Sustainably Reusing and Recycling School Devices

An expert offers tips for K-12 administrators and their IT teams on how to make the most out of their investment in Chromebooks with security and sustainability in mind, and recommends schools revise their IT equipment policies to address used and end-of-life devices, including Chromebooks.

image shows a stack of file folders

Shifting from Paper to the Cloud: How K-12 Schools are Digitizing Operations

Digitization is the key to eliminating backlogs of paper processes made worse by staff shortages and other post-pandemic challenges. Schools can create modern and digitized systems that make documents searchable and accessible — eliminating the time required to file and search through boxes for old student transcripts, test scores, health records, and more.

logo and image reads: ed tech explainer 7 questions Lenovo plus LanSchool

7 Questions with Lenovo + LanSchool: A One-Stop-Shop Approach to School Technology with an Emphasis on Inclusivity in Classrooms

For THE Journal's 7 Questions Ed Tech Explainer series, Lenovo’s Education Software General Manager Coby Gurr shares how Lenovo’s K–12 division and particularly its classroom management software LanSchool emphasize inclusivity, accessibility, and a holistic, integrated approach to school technology — and how Lenovo EDU’s line of hardware, software, and services aim to provide a “comprehensive learning environment.”

image shows a man sitting at several computer screens that each say RANSOMWARE and the man holds his head in his hands looking overwhelmed. Text reads Post Cyber Attack Top Do

After a Cyber Attack: Three Do's and Don'ts for K-12 Leaders and IT Teams

Charlie Sander of cybersecurity firm Managed Methods shares some tips to avoid making a cyber incident on a K-12 school even more costly, for district leaders, risk management planners, and IT practitioners: What to expect and some do’s and don’ts to move forward while minimizing an cyber attack's negative impacts and costly disruptions.