{"id":4899,"date":"2023-01-06T20:40:08","date_gmt":"2023-01-06T20:40:08","guid":{"rendered":"https:\/\/onset-media.com\/eaglesafe\/?p=4899"},"modified":"2023-01-25T12:51:49","modified_gmt":"2023-01-25T12:51:49","slug":"dont-get-schooled-by-cybercriminals-back-to-school-cybersecurity-tips","status":"publish","type":"post","link":"https:\/\/onset-media.com\/eaglesafe\/blogs\/dont-get-schooled-by-cybercriminals-back-to-school-cybersecurity-tips\/","title":{"rendered":"<strong>Don&#8217;t Get Schooled by Cybercriminals: Back-to-School Cybersecurity Tips<\/strong>"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4899\" class=\"elementor elementor-4899\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2b4ba95e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2b4ba95e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-10c3b116\" data-id=\"10c3b116\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e41eab elementor-widget elementor-widget-heading\" data-id=\"3e41eab\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.11.1 - 15-02-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Back to School<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a988f2a elementor-widget elementor-widget-text-editor\" data-id=\"a988f2a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.11.1 - 15-02-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>A new school year provides hope and enthusiasm for students and instructors, as well as some respite for parents. And this new beginning is an excellent opportunity to reset your personal cybersecurity awareness in order to set yourself up for success.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-908d266 elementor-widget elementor-widget-heading\" data-id=\"908d266\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Everyone is vulnerable to cyberattacks, regardless of age.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8d74a1 elementor-widget elementor-widget-text-editor\" data-id=\"b8d74a1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Chromebooks and iPads have replaced paper and pencils in the classroom. Teachers engage with parents and students via apps and email. As the world becomes more computerized, children and parents must be on the lookout for cyberattacks.<\/p>\n<p>Unfortunately, even the youngest among us are vulnerable to cyberattacks. Consider the recent Neopets breach. The virtual pet management service, which is largely used by youngsters, recently experienced a data breach that affected 69 million members, revealing usernames, passwords, dates of birth, and email addresses, among other pieces of personally identifying information (PII).<\/p>\n<p>This type of news puts both the individual and the organization at risk, particularly for workers who work remotely or use unmanaged or personal devices with corporate accounts that may include children\u2019s apps\/games on them. These kind of attacks could result in malware infections that lead to ransomware attacks in the company. With children creating more online accounts sooner than ever before, it creates a fertile ground for fraudsters to develop synthetic identities using compromised children\u2019s data.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f25c7bf elementor-widget elementor-widget-heading\" data-id=\"f25c7bf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity for the Education Sector<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-edc02f6 elementor-widget elementor-widget-text-editor\" data-id=\"edc02f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>With the push for remote learning during the pandemic, many institutions were unprepared for the vulnerabilities that came with an enhanced attack surface. The education sector is a popular target for cyberattacks, with 56% of lower education organizations and 64% of higher education organizations being infected with ransomware in the last year. SafeMonitor discovered approximately 180 million breach records from.edu domains in our recovered data over the previous 5 years.<\/p>\n<p>According to the most current State of EdTech Leadership report, cybersecurity and student data protection are the top priorities for school district IT executives, yet just 54% of K-12 IT leaders polled had high confidence in their capacity to handle a cyberthreat. Furthermore, funding restrictions and a lack of resources continue to be problems for district IT administrators in successfully and reliably protecting against cyberattacks.<\/p>\n<p>Implementing strong password restrictions to prevent the danger of account takeover is one method IT teams in the education sector may improve threat protection (ATO). It also helps to spread cybersecurity education and awareness to everyone so that students and employees alike take additional precautions when utilizing district assets and accounts.<\/p>\n<p>The University of Oklahoma, for example, understands the significance of rigorous password protection. They are aware of password reuse and the harm that a single hacked password might pose to several accounts. As a result, they deploy SafeMonitor services to guard against ATO and raise cybersecurity awareness in order to stimulate learning outside of the classroom and have an influence on the daily lives of students and staff.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ae2c33 elementor-widget elementor-widget-heading\" data-id=\"4ae2c33\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Back-to-School Cybersecurity Tips<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-526f91f elementor-widget elementor-widget-text-editor\" data-id=\"526f91f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>As children, teachers, administrators, and staff return to school with the hope of a good year, we provide these recommendations to assist safeguard you and your family, as well as pass along to colleagues to defend against hackers.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b210a3e elementor-widget elementor-widget-heading\" data-id=\"b210a3e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Keep your work and personal computers and accounts separate.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eec65a2 elementor-widget elementor-widget-text-editor\" data-id=\"eec65a2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>I don\u2019t know about you, but my kids adore everything that isn\u2019t theirs \u2013 they always want to use my phone to text or call Grandma, and they are fascinated by my work computer. Allowing others to use your work gadgets, on the other hand, can put you and your organization at risk. What if they download something they shouldn\u2019t and infect your device with malware? What if they utilize hacked browser credentials that a fraudster then uses for account takeover (ATO) or online fraud? Ensuring the protection of your corporate assets is vital, and it may even be part of your organization\u2019s corporate rules. Using your work computer just for work purposes is the greatest approach to safeguard yourself and your company.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dacb7dd elementor-widget elementor-widget-heading\" data-id=\"dacb7dd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Instill robust password hygiene in everyone in your family.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77206a9 elementor-widget elementor-widget-text-editor\" data-id=\"77206a9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>My primary school child already has accounts with an authentication\/2FA program \u2013 it\u2019s the district\u2019s one-stop-shop for all learning sites. It\u2019s enabled on our family\u2019s personal computer, and we made a point of ensuring that the password for that account complies with the most recent recommendations for strong passwords in order to protect my child\u2019s digital identity and our family from compromise or intrusion. Using family password managers aids in the creation of strong passwords, their storage, and the provision of access to the appropriate persons in the event of an emergency. Passwords should be complicated, with at least 16 characters, and should avoid common words\/phrases such as sports team names, the latest pop star, or the name of the most watched bingeable TV show. And use a different password for each account \u2013 password reuse is a normal human trait, and if you use the same weak password across many accounts, the likelihood of it being compromised grows considerably. No one is too young to learn cybersecurity best practices, and starting with the basics of simple password security and hygiene is a fantastic place to start.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46a8fe3 elementor-widget elementor-widget-heading\" data-id=\"46a8fe3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Keep an eye on your child\u2019s online activity.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22bdea6 elementor-widget elementor-widget-text-editor\" data-id=\"22bdea6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>When my other child requests to borrow my phone \u201cfor just a minute,\u201d what they really want to do is use it for 20 minutes and watch YouTube videos. And, while I admit that I sometimes let them have it, I still try to keep track of what they\u2019re doing with it. We have parental controls on our children\u2019s iPads, but it\u2019s a free for all on my phone. Not only do I want to make sure they\u2019re not viewing something they shouldn\u2019t (anyone else get irritated by the Momo Challenge or Huggy Wuggy?! ), but there\u2019s also the risk that they\u2019ll access applications or websites they shouldn\u2019t, or put my phone and online accounts vulnerable to cyber threats. Knowing exactly what your children are doing online might be difficult, but developing that trust early on can help both them and you feel confident in their digital knowledge. The National Online Safety website is an excellent resource for parents and teachers, as it provides information on tips and trends to be aware of in order to keep your children and pupils safe online.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e18dd1 elementor-widget elementor-widget-heading\" data-id=\"9e18dd1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Before the bell rings\u2026<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20e8504 elementor-widget elementor-widget-text-editor\" data-id=\"20e8504\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>It is never too early to instill security best practices in the entire family. With so much activity on the criminal underworld and fraudsters doing whatever it takes to make a buck, it\u2019s critical to safeguard your family\u2019s personal information. Begin the school year on the right foot by brushing up on your cybersecurity knowledge!<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Back to School A new school year provides hope and enthusiasm for students and instructors, as well as some respite for parents. And this new beginning is an excellent opportunity to reset your personal cybersecurity awareness in order to set yourself up for success. Everyone is vulnerable to cyberattacks, regardless of age. Chromebooks and iPads &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/onset-media.com\/eaglesafe\/blogs\/dont-get-schooled-by-cybercriminals-back-to-school-cybersecurity-tips\/\"> <span class=\"screen-reader-text\"><strong>Don&#8217;t Get Schooled by Cybercriminals: Back-to-School Cybersecurity Tips<\/strong><\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":5520,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":0,"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":""},"categories":[1],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/posts\/4899"}],"collection":[{"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/comments?post=4899"}],"version-history":[{"count":5,"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/posts\/4899\/revisions"}],"predecessor-version":[{"id":5528,"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/posts\/4899\/revisions\/5528"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/media\/5520"}],"wp:attachment":[{"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/media?parent=4899"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/categories?post=4899"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/tags?post=4899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}