information with someone you don’t know over email. Unsecured Devices • Keep computers and applications up-to-date.
• Have anti-virus and Anti-
malware programs installed.
• Unauthorized access. Social Engineering Exploits Human Trust.
Verify who you’re talking to.
Don’t give out sensitive
information. Trojan Horse Attacks • Avoid downloading non-work related programs.
• Have Anti-Virus and Anti-
Malware installed.
• Only download trusted programs
from their trusted websites. Physical Security • Keep important devices, like servers and routers, behind locked doors.
• Monitor access to restricted
areas How To Stay Safe • Keep Passwords secure, follow the password policy. • Keep all systems up-to-date with software updates and patches. • Verify identify before sending sensitive info. • Use secure devices on secure networks. • Run regular anti-virus and anti- malware scan. Consequences of a Breach Possible violation of federal laws such as:
• Family Educational Rights and
Privacy Act (FERPA)
• Children's Online Privacy
Protection Act (COPPA) Recent attacks could potentially violate these laws. References: CISA, Protecting Our Future https://www.cisa.gov/protecting-our-future-cybe rsecurity-k-12
Daniel Brecht, January 11, 2021,
Password security: Complexity vs. length https://resources.infosecinstitute.com/topics/sec urity-awareness/password-security-complexity- vs-length/