Our first technology-related priority is always the safety and well-being of our students. As such, we carefully consider the role of technology in their educational experiences and monitor usage on a regular basis to ensure privacy of information and appropriateness of resources. Please explore the links below to learn more about our efforts to keep personal data secure and private.
Research shows that 95% of data breaches are the result of human error! One of the most common schemes hackers use to access accounts is phishing. In the few short months I have been in Garrison, I have seen multiple attempted phishing emails make it through to our inboxes. It's so important that faculty and staff are aware of this tactic and able to recognize it.
Should you click? Should you reply?
Malware refers to any intrusive software developed by cybercriminals to steal data and damage or destroy computers and computer systems. The topic for this week’s Cybersecurity blast is a review of types of malware and how to avoid them. Feel free to print out, post and share with your staff as we work together to build a culture of cybersecurity and data protection in our districts.
Check out all the different types of malware here.
Tips to Avoid Malware
Remember hacking a human is easier than hacking a computer! People being mindful and smart about technology and data is the best defense!
Area of Risk: Phone
Hacker Tactic: Impersonation, caller is in a panic or angry
Defense Strategy: Never give out passwords or other confidential information by phone
Area of Risk: Typosquatting
Hacker Tactic: Similar to a phishing attack, but the hacker sits on a similar domain name and waits
Defense Strategy: Double check the web adddress to be sure there are no typos or added characters
Area of Risk: Building Entrance
Hacker Tactic: Unauthorized Physical Access
Defense Strategy: Badge security, discourage piggyback entry, and security officers present at entrance
Area of Risk: Office
Hacker Tactic: Shoulder Surfing
Defense Strategy: Don't type in passwords with anyone else present. If you must log-in, do it quickly
Area of Risk: Dumpsters
Hacker Tactic: Dumpster Diving
Defense Strategy: Shred documents, erase all device data before discard