Technology Integration Services » Staff Cybersecurity Training

Staff Cybersecurity Training

Cybersecurity might seem technical, but it’s vital for teachers and school staff to understand and follow best practices. Schools and districts increasingly rely on technology and connectivity. These services enhance learning, but also expose schools to cyber threats. The stakes are high: a successful cyberattack can halt learning and compromise student privacy. Even trusted systems can be attacked, and human vigilance is often the last line of defense. 

Cybersecurity Training Topics

Use these topics to learn how to protect our district from cybersecurity attacks! By understanding the threats and following these fundamental practices, you can significantly reduce the risk of a cyber incident at the district and foster a safer digital environment for everyone in the school community.

If you have any questions, contact our technical support team. We're here to help!


Phishing & Email Scams: Think Before You Click

phishing-icon
 
One of the most common threats you’ll face is phishing–fraudulent messages that trick you into divulging information or installing malware. Phishing emails often pretend to be from a familiar source, such as the district IT department, a colleague, or a known company, but they actually come from cybercriminals. The goal is usually to get you to click a malicious link, open an infected attachment, or reveal sensitive data like your login credentials.

Malware & Internet Scams

malware icon
 
Beyond email, threats can come from general web browsing and online activities. Content filters and firewalls effectively block malicious sites, but no system is perfect. Always practice safe browsing habits, be aware of common web-based threats, and maintain a healthy skepticism online. By avoiding the sketchy corners of the internet and being mindful of what you click, you greatly reduce the chance of getting hit with malware or other cyber nasties.

Strong Passwords & Account Security

account-security-icon
 
Your password is often the only thing between a hacker and sensitive school information. Weak or reused passwords are a leading cause of school data breaches. Always use strong, unique passwords for your school accounts (email, grading systems, etc.) to make it much harder for attackers to gain access. See the SLZUSD Password Protocol for district password guidelines.

Multi-Factor Authentication (MFA): An Extra Layer of Security

mfa-icon
 
Multi-factor authentication is one of the most effective tools for securing your accounts. MFA means that in addition to your password, you need a second step to log in–typically a code from a smartphone app or a physical security key. At SLZUSD, we use Cisco Duo MFA, which helps block most unauthorized access attempts.

Device Security & Safe Technology Use

device security icon
 
Modern classrooms and offices are filled with devices: desktop computers, laptops, tablets, smartphones, interactive whiteboards, and more. Keeping these devices secure is just as important as safeguarding your passwords. Here you'll learn digital security practices (updates, antivirus) and physical security for your devices. Following these guidelines will help you greatly reduce the risk of accidents or attacks. A secure device means that even if someone tries to breach it, they'll hit a wall.

Protecting Student Data & Privacy

student data privacy
 
Teachers and school administrators are entrusted with sensitive information about students, families, and staff, from grades and contact details to health records or IEP documents. Protecting this data is not only about compliance with laws like FERPA, COPPA, and CIPA, but also about maintaining the trust and safety of your students. By treating student and staff data with care, you not only comply with privacy regulations but also protect your students from potential harm, such as identity theft or embarrassment. Follow these key practices for handling sensitive data.

Incident Response: What to Do If Something Goes Wrong

incidence response icon
 
Despite our best efforts, mistakes and incidents can happen. Maybe someone clicked a bad link or a laptop was stolen, or you notice something odd (like files disappearing or a suspicious login notification). How you respond in those first moments can make a big difference in limiting damage. It’s important to be prepared and know the proper steps to take when a cybersecurity incident occurs.