Reporting Incidents
If you encounter a potential cyber security threat (e.g., phishing, malware, etc.), follow these instructions on how to report a cybersecurity incident.
We use CyberNut to continuously test staff with simulated phishing emails and to provide training. If you suspect an email to be a phishing attack, report it using the procedure described above. Testing and training both help us to prevent cybersecurity incidents and, consequently, this helps us to minimize insurance costs.
Securing Information
The information below covers procedures for devices and information that are staff are expected to use in order to secure confidential data.
✅ Password Management with Keeper
Password security is a critical component of our cybersecurity, and staff are required to use Keeper for managing passwords. You can log into Keeper on all of your devices using your school Google account. Keeper:
- Auto-generates secure passwords for you
- Saves your passwords and fills them in when you log into websites
- Allows you to securely share passwords with coworkers (one-time or indefinitely)
- Allows SCRED tech staff to have administrative control
- Provides a free Keeper family account for personal use
Resources:
✅ Multi-Factor Authentication (MFA)
Websites and apps increasingly offer multiple ways to confirm that you are really you — even if a password is leaked or stolen, the thieves won't be able to access your data because they can't prove they are you.
Examples of MFA include: asking you to approve the log in from another of your devices, using the fingerprint or face ID scanner on another of your devices, sending unique codes (ex. 458399) to another of your devices, and using an authenticator app to securely generate these short codes on another of your devices.
Staff are required to use MFA on their district Google accounts and to use an authenticator app. Here's how:
- Turn on MFA for your Google account
- Review the list of MFA options and select the authenticator app option
- Google will provide a QR code for you to scan with your phone.
- Either download the 🎥 Google Authenticator app (2:16) or use the Apple Passwords app that is pre-installed on iPhones. After scanning the QR code with either your Google or Apple app, the authenticator app will begin securely generating security codes (ex. 458399).
- The next time you log in to your Google account, it may prompt you to take out your phone, open the authenticator app, and then type the unique code into your computer to prove that it is really you trying to log into your Google account.
✅ Sending and Receiving Data Securely
Review the linked presentation for information on our procedures for how to use email, send and receive files, etc. in a secure manner that protects confidential data.
✅ Clear Desks and Clear Screens
Our Clear Desk and Clear Screen Procedure is important to ensure that all sensitive/confidential materials are removed from your workspace and locked away when items are not in use or you leave your laptop or workspace unattended.
|
Tech Support
Email [email protected] to submit a support ticket. Support staff at the SCRED office will address your issue ASAP and wrap in additional staff if needed.
|
|
Connect
If you have questions about cybersecurity, please reach out to our technology staff using their contact info. below.
|