Controlling your online environment

Creating a secure and safe computing environment is never an easy task, especially when you are responsible for the diverse requirements needed at one of Canada’s largest school boards.

David Klein, network analyst, computer services with the Toronto Catholic District School Board (TCSB), and his team are responsible for walking a fine line in order to create a solution which allows for high levels of protection for those students in elementary school accessing the Internet, yet lessens the controls for high school students and administrative staff access.

The TCSB cannot provide a one-size-fits-all solution, he said, so it has to tailor its solution to specific needs.

The fine line Klein’s team has to walk is the educational mandate that allows children to explore thoughts and ideas while still in a safe and controlled learning environment. While a larger corporation can write generic, role-based access rules, in an educational environment controls have to be very specific. Access may need to vary from class to grade.

“We have three overall goals,” Klein said: to protect the system, to protect the students and to aid teachers and staff in delivering educational content.

For security, the TCSB uses a variety of Symantec Corp.’s products, from basic firewall protection to Web access control and content filtering software. With over 200 different physical sites, the ability to centrally manage security was an absolutely necessity, Klein said. The school board also uses a variety of other technologies to control computer access.

For example, using a technology called Visual Casel, a teacher can limit the software applications students can use in a classroom so they are focusing on the lesson at hand. “You don’t want them doing their math homework…in geography class,” Klein said.

One similarity with a large-scale enterprise is the need to monitor the overall IT system since internal threats are very real. Though the vast majority of the 100,000 plus students are “really good,” Klein admitted the TCSB has “about 100,000 potential little hackers.” Curious and inquisitive students are a potential threat even though it may be unintentional.

The diligence has paid off. One student brought in a hacking tool on a floppy disk. As a default the TCSB systems scans all floppies. The tool was detected and erased, and unbeknownst to the student, an audit trail led Klein’s team back to the individual. The student was suspended. “We are doing pretty well but we could still do better,” Klein admitted. “We really need to improve on educating our end users.”

Letting students know the systems are being monitored helps, he said.

Kiron Bondale agreed that end-user education is key, and without it a company is incredibly vulnerable. Without educated end users “all the technology in the world won’t protect you from an incident,” he said.

At MDS Inc., where Bondale is a senior project manager, the company uses a combination of spot checks and auditing, along with educational programs, to see how security awareness is progressing. If spot checks find that a certain educational message is not sinking in, say locking down a screen when a user leaves his or her computer, MDS can re-focus and improve the educational message.

MDS, a company which employs about 10,000 people in the health care and life sciences sector, also sends out frequent FAQs of the “are you aware of?” variety. The change is not overnight, Bondale said. “You get incremental improvement.” The company also uses tools to monitor these improvements, “where we are compared to our (security) baseline,” he said. But “we are not trying to be cops.”

But since MDS is in the health care industry, the fallout from security problems is not just a media relations nightmare. The industry is heavily regulated by privacy laws such as the Health Insurance Portability and Accountability Act (U.S.) and the Personal Information Protection and Electronic Documents Act (Canada).

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now