ALWAYS | NEVER |
---|---|
|
|
41.3% failure rate, over 240 individuals clicked on the link, many provided their District login and password.
How does a computer become infected with Ransomeware? - Often spread through phishing emails that contain malicious attachments or unknowingly visiting an infected website where the malware is downloaded and installed within the user's knowledge.
What's the impact? - Passwords, accounts & data compromised, (personal and district), files encrypted and possibly lost, downed network services; including internet, phones and access controls for days or weeks, loss of instructional time, not to mention potentially tens if not hundreds of thousands of dollars.
Why should we worry? - The frequency and severity of cyber attacks targeting school districts has increased significantly this year, not to mention become increasingly challenging to detect.
Previous Phishing Email Look-Fors
Phishing Attacks - Being Aware & Being Vigilant!
More Significant Than Ever!
Spring 2019: Over 20 staff members fell victim to the recent Phishing attack targeting our District entitled; "District Proposed Salary Schedule". Most of those involved downloaded the .pdf attachment while a few went as far as accessing the website linked within the attachment and inputting confidential information, resulting in their District accounts being compromised. Remember to be skeptical of every email and when in doubt, contact the Tech Dept.
What happened as a result?
Close to 300,000 emails were generated from the compromised accounts to various accounts around the world.
Our email domain was "blacklisted" on two global SPAM filters forcing us to remediate until removed from lists.
Our Internet Service Provider threatened to block all district, email traffic due to receiving multiple complaints from other Districts & organizations.
What could have happened?
All data on the devices related to the compromised accounts completely lost.
Any programs or services related to the accounts, including data & information available within each program, could have also been compromised.
This includes any sites with login credentials stored using Google Password Manager such as banking, credit card & other personal websites
Student and staff personal and/or financial information compromised - See San Diego School District Data Breach Hits 500k Students
Moving Forward
Increasing efforts to heighten staff awareness and vigilance, including more frequent & challenging Phishing Training Campaigns
Increased accountability for those succumbing to Phishing attacks, both real and District generated
Improved communication and remediation efforts related to actual Phishing attacks
Improved security procedures and strategies at all levels
Be Aware! - Review every email with skepticism
Ask yourself the "Key Three" questions below. When in doubt, ask the Tech Dept!
Who is the Sender and what is the email address listed?
Is the Sender asking me to open an attachment or click on a link? Hover over the link/attachment
Does the email seem odd? Is there an urgent message / not typically something the Sender would write? Mistakes?
Student Device Management Expectations
Document and assign students the same computer to use whenever possible. Remember, the 1st login on any device takes more time.
Be vigilant. Actively monitor student use and assess the laptop/desktop after every use. Can be accomplished in less then 1-2 minutes.
Report negligent or malicious behavior and submit a work order IMMEDIATELY if there is an issue.
Students MUST LOGOUT after every use.
Laptops should be rebooted, (powered off) at least once a week if not daily.
Designate a staff member to be a Cart Manager to assure all the laptops have been returned, are plugged in and the cart secured at the end of each day.
Be sure that the cart is plugged in and ALL laptops are charging after use.
The Cost for damages exceeding normal wear and tear will be charged directly to the building/department and repeated damages to the same cart/cabinet will result in the removal of devices from use. Damages & repairs will be tracked by the Technology Department within the new Web Helpdesk Asset Manager.
To reiterate . . .The cost for replacing (3) Dell 3340 student laptop keyboards = one new Chromebook
Information related to the Child Online Privacy Protection Act (COPPA) is provided via the link below. This new federal law requires that websites notify parents and obtain parental consent when collecting personal information from children under the age of 13. Under the law, schools are permitted to provide consent to the collection of personal information on behalf of its students, eliminating the need for individual parent consent be given directly to the web site provider. For more information on COPPA, please visit; https://www.ftc.gov/tips-advice/business-center/guidance/complying-coppa-frequently-asked-questions.
Educational web-based tools and applications provide our teachers with resources to enhance, enrich and differentiate curriculum delivery and instruction to our students. Our district carefully reviews online resources for the program's ability to meet our students’ needs while protecting the confidentiality of personally identifiable information.
Some web-based programs require some student data to create accounts. KCSD does not require nor encourage students to provide additional personal information beyond what is required to create student accounts. Each provider offers information about their organization's collection, use, protection, and disclosure of data through their unique privacy policies, which can be found on their websites.
- For parents/guardians of children under the age of 13, you are required by COPPA to agree to the online consent form included within the KCSD Parent Portal in order for the District to allow your student to access online educational services for the upcoming school year.
- For KCSD Staff, any programs not included on the KCSD Educational Services list must be pre-approved by a Building Administrator before acquiring parent consent to create accounts for children under the age of 13.
Related Resources
- KCSD Educational Services and Children's Online Privacy Protection Act (COPPA) Overview
Student Privacy Pledge - https://studentprivacypledge.org/signatories/
iKeepSafe - https://ikeepsafe.org/
Already Implemented
- District wide randomly generated, student password reset
- Substitute Laptop Restrictions - Accessed using Substitute Guest Accounts only, refreshed on a weekly basis
- Local Administrator Access Revoked on Staff Devices
To Be Implemented
- Annual District wide randomly generated, student password reset
- Annual District wide staff password reset (individually created during staff laptop assessment)
- Progressive consequences for staff with multiple failures from Phishing Attacks (Real/Training), “3 strikes & out”
- Restricted email access to internal email only then restricted internet access
Future Consideration
- Staff Devices - Access restricted to staff only; no student access allowed
- Student Devices - Access restricted to students only; no staff access allowed
- Reduce Auto-Lock duration for staff and students
KnowBe4 Tip of the Week
KnowBe4 Security Tips - What Are Browser Notifications?
Most internet browsers allow websites to offer browser notifications. The first time you visit a website that offers browser notifications, you will see a pop-up message at the top of your browser window asking you to either allow or block notifications. If you choose to allow them, browser notifications can be displayed at any time, even when you are not on that website. These notifications are typically used for things like blog updates, social media interactions, and upcoming sales. Unfortunately, cybercriminals can also send their own malicious browser notifications to steal your money and information.
How Do Cybercriminals Use Browser Notifications?
Cybercriminals can use two different methods to send you malicious browser notifications. They can either hijack a legitimate website and offer fake notifications from that website, or they can trick you into allowing notifications while visiting a malicious website. For example, in one scam, cybercriminals used a malicious website that appeared to be a video player and instructed users to click "Allow" before they could play a video. Once cybercriminals are able to send you browser notifications, they can use the notifications in several ways:
- They can display excessive pop-up messages, inappropriate content, or other disruptive material in your browser. This tactic allows cybercriminals to hold your system hostage while they demand a ransom.
- They can send you malicious advertisements, also known as malvertising. Malvertising is when cybercriminals use ads to spread malware, trick you into providing sensitive information, or steal your money using fake storefronts.
- They can include malicious files and code within browser notifications. If you click on one of these malicious notifications, your system may be automatically prompted to download a piece of malware.
Hints and Tips to Stay Safe
Use the tips below to stay safe from malicious browser notifications:
· Think before you click! Whether it is a browser notification or another kind of pop-up message, always read and consider a prompt before taking action.
· Check the permissions settings within your browser and only allow notifications for websites that you know and trust. Most browsers include a list of websites that are allowed to send you notifications. Some browsers also allow you to globally block notifications for all websites.
· Keep your browser and other software up-to-date. Software updates often include security patches that help close known vulnerabilities. We recommend enabling automatic updates to ensure that your browser is always up-to-date.
Be Aware, Be Vigilant, Be Skeptical!
Security Tips of the Week Archive
*Click images to enlarge
Visit Connect.kcsd.org to stay "Kennett ConnectED"
- KennectED - District Technology; News, Events & Celebrations
- KCSD Cyber Safety & Security Awareness
- KCSD Newsletter
- CONNECT Dashboard inc. Student Resources
- Kennett ConnectED - KCSD Technology Vision & Goals
- District Website
- Why Kennett?
- Visit us on Twitter; https://twitter.com/KCSD"building"
Bancroft Elementary School: https://twitter.com/KCSDBancroft
Greenwood Elementary School: https://twitter.com/KCSDGreenwood
New Garden Elementary School: https://twitter.com/KCSDNewGarden
Mary D. Lang Kindergarten Center: https://twitter.com/KCSDMaryDLang
Kennett Middle School: https://twitter.com/KCSDKennettMS
Kennett High School: https://twitter.com/KCSDKennettHS
Kennett High School Sports: https://twitter.com/KCSDKHS_Sports
More more information please contact:
Dan Maguire, Supervisor of Technology Services dmaguire@kcsd.org or 610.444.4136