You are on page 1of 11

Data Protection &

Security Training
By Kevin Coyne
Data Protection &
Security Training
 All systems are vulnerable to
attacks.

• There's ways to prevent


common attack types.

• Keeping student records safe.


Weak Passwords
• Don’t use simple dictionary
words as passwords.

• Use special characters and


numbers in order to make a
password hard to guess.

• Use Two-Step or Multi-factor


authentication whenever
possible.
Phishing Attacks
• Avoid suspicious emails

• Don’t enter your username and


password from links you clicked.

• Don’t share confidential


information with someone you
don’t know over email.
Unsecured
Devices
• Keep computers and
applications up-to-date.

• Have anti-virus and Anti-


malware programs installed.

• Unauthorized access.
Social
Engineering
 Exploits Human Trust.

 Verify who you’re talking to.

 Don’t give out sensitive


information.
Trojan Horse
Attacks
• Avoid downloading non-work
related programs.

• Have Anti-Virus and Anti-


Malware installed.

• Only download trusted programs


from their trusted websites.
Physical Security
• Keep important devices, like
servers and routers, behind
locked doors.

• Monitor access to restricted


areas
How To Stay Safe
• Keep Passwords secure, follow
the password policy.
• Keep all systems up-to-date with
software updates and patches.
• Verify identify before sending
sensitive info.
• Use secure devices on secure
networks.
• Run regular anti-virus and anti-
malware scan.
Consequences of
a Breach
Possible violation of federal laws
such as:

• Family Educational Rights and


Privacy Act (FERPA)

• Children's Online Privacy


Protection Act (COPPA)
Recent attacks could potentially
violate these laws.
References:
CISA, Protecting Our Future
https://www.cisa.gov/protecting-our-future-cybe
rsecurity-k-12

Daniel Brecht, January 11, 2021,


Password security: Complexity vs.
length
https://resources.infosecinstitute.com/topics/sec
urity-awareness/password-security-complexity-
vs-length/

You might also like