Given the increase in cyberattacks recorded in the last year within the education sector, cybersecurity has become a central issue in the academic management of schools, directing attention to the educational software that manage the institutions' data.

According to the "Security 2022 Report"conducted by Check Point Software Technologies, the education sector was the top target for cybercrime in 2021with an average of almost 1,605 attacks per week per organization. Which represents a 75% increase compared to 2020.

Being aware of the seriousness of the current context, in Phidias we want to dedicate a special entry to share a summary of the security mechanisms that our platform has, so you can protect your school data and avoid any kind of vulnerabilities.

What is the advanced cybersecurity of Phidias educational software?

  • Roles and access

The first security element that integrates our educational software is what we call "roles and access". This refers to the fact that each user of the system has an assigned role, which has certain specific permissions associated with it that only grant access to the information they need or that the institution considers pertinent. For example, the nursing staff is only allowed to see the students' medical records.

But what happens if a parent is also a collaborator of the school? In such cases, Phidias offers the possibility for the same user to have several roles with different permissions configured. This ensures that users users can view only the data strictly necessary for each role. in each role.

To better illustrate this point, let's assume that a parent is also a teacher at the institution. Therefore, with the same user, he/she can log in as a teacher to record the grades of his/her students, and consult his/her child's grades as any other parent in the school would see them.

  • Activity log

Secondly, the activity log is a function that allows you to record all the to record all the clicks that each user performs on the platform (including date and time). In this way, it is possible to recreate all the actions carried out by a given user in case a situation occurs that merits further investigation.

  • Backup copies

Because we know that nowadays information backups are everything, our educational software automatically generates backups every 24 hours. In addition, the system allows you to run backups before performing sensitive operations.

  • Automatic logout

As its name suggests, this mechanism consists of automatically closing a user's session after a certain number of minutes of inactivity. This, in order to avoid a possible vulnerability.

  • Secure password storage

Undoubtedly, a crucial aspect of cybersecurity cybersecurity security. Our academic management system is designed to store all passwords store all passwords in an encrypted manner (hashing), so that not even developers can see them.

  • Access via HTTPS protocol

Last but not least, the HTTPS protocol (Hypertext Transfer Protocol Secure) protocol used in our educational software encrypts all the information that travels within the system, making it difficult to breach.

It is worth noting that, unlike other systems, Phidias has integrated this protocol throughout its platform, instead of only having it on the registration page or login.

CTA key aspects

Additional security tools

In addition to the aforementioned mechanisms, our academic software for schools has additional tools that reinforce cybersecurity by promoting a set of healthy practices in the handling of information. These are:

  • Two-step authentication

Two-step authentication helps to strengthen protection against user vulnerabilities by generating a token, without which a person cannot log in to the system.

  • Blocking by attempts

On the other hand, Phidias is configured in such a way that, if a person makes 3 failed login attempts, the system automatically sends a notification to the user warning that the user will be permanently blocked if he/she fails one more time.

Thus, if someone is trying to break into the system from "X" user, access will be automatically blocked after that number of failed attempts.

  • Phidias employee access log

The school also has at its disposal a log, in which it can consult which Phidias employees (consultants, coordinators or directors) have accessed the platform, indicating the time, date and reason for the consultation. This employee access log adds four layers of security al:

  • Require a Phidias email address to log in to the platform (e.g.
  • Only allow access if the user is authorized in the database.
  • Request the reason for needing access to the database
  • Have the ability to track exactly what the consultant did within the platform and at the time he/she did it (thanks to the activity log mentioned above).thanks to the activity log mentioned above)
  • Password management option

Finally, our educational software has mechanisms that allow the school to configure the level of difficulty of the passwords (weak, intermediate or strong), their size (6, 8, 12 or 16 characters), as well as to prevent users from repeating previously registered passwords. This, following the global guidelines that determine the levels of security in passwords.

Thanks to these attributes and a few more features, our educational software educational software is ranked as one of the systems with the highest cybersecurity standards on the market.Send us a message and learn more about how we can help you protect your school's data!

Contact a consultant